Search
Now showing items 61-70 of 74
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
(
World Scientific Publishing Co. Pte Ltd
, 2016 , Article)
In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
Parallelizing exact motif finding algorithms on multi-core
(
Springer Science+Business Media
, 2014 , Article)
The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
Enabling broadcast communications in presence of jamming via probabilistic pairing
(
Elsevier B.V.
, 2017 , Article)
This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the growing need of developing real-time energy management and automation systems, building energy efficiency is of large focus in recent research. In particular, school buildings require special attention to occupants' ...
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
Short survey of techniques for visualizing events recorded in logs
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
Compressive sensing based electronic nose platform
(
Elsevier
, 2017 , Article)
Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
Systematic identification of threats in the cloud: A Survey
(
Elsevier B.V.
, 2019 , Article)
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
Deep learning for detection of routing attacks in the internet of things
(
Atlantis Press
, 2018 , Article)
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
Proportionally fair approach for tor's circuits scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...