Search
Now showing items 31-40 of 7256
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
(
Inderscience Publishers
, 2019 , Article)
To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication ...
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ...
Energy-Efficient Resource Allocation and Provisioning Framework for Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Energy efficiency has recently become a major issue in large data centers due to financial and environmental concerns. This paper proposes an integrated energy-Aware resource provisioning framework for cloud data centers. ...
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
Trust management techniques for the internet of things: A survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be ...
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...
Toward SLAs Guaranteed Scalable VDC Provisioning in Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Cloud computing has been a cost-efficient paradigm for deploying various applications in datacenters in recent years. Therefore, efficient provisioning for virtual data center (VDC) requests from different service providers ...