Search
Now showing items 2071-2080 of 2362
Mobile crowdsourced sensors selection for journey services
(
Springer Verlag
, 2018 , Conference Paper)
We propose a mobile crowdsourced sensors selection approach to improve the journey planning service especially in areas where no wireless or vehicular sensors are available. We develop a location estimation model of journey ...
An autonomic detection and protection system for denial of service attack
(
ACTA Press
, 2012 , Conference Paper)
This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
Towards model-based management of database fragmentation
(
USENIX Association
, 2013 , Conference Paper)
The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ...
Toward a conceptual model for examining the role of social media on social customer relationship management (SCRM) system
(
Springer
, 2018 , Conference Paper)
Organizations worldwide are becoming more interested in utilizing social media applications to enhance their marketing capabilities. One of the main fruits of integrating social media applications into the marketing, ...
A Bilingual Scene-To-Speech Mobile Based Application
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Scene-To-Speech (STS) is the process of recognizing visual objects in a picture or a video to say aloud a descriptive text that represents the scene. The recent advancement in convolution neural network (CNN), a deep ...
Unsupervised Technique for Anomaly Detection in Qatar Stock Market
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
The aim of anomaly detection is to find patterns or data points that are not confirming the expected behavior inside the dataset. Techniques from a variety of disciplines like machine learning, statistics, information ...
Mobile Assistive Technologies for Visual Impaired Users: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In this article, we summarize some of the recent advancements in assistive technologies that are designed for people with visual impairments (VI) and blind people. Present technology enables applications to be actively ...
Fog Computing Potentials, Applications, and Challenges
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
The emergence of Internet of Things (IoT) and the technological advancements of smart devices and wearable gadgets, are empowering new real-Time applications such as health monitoring, traffic monitoring, tele-surveillance, ...