بحث بسيط
السجلات المعروضة 141 -- 150 من 173
Software interfaces: On the impact of interface design anomalies
(
IEEE
, 2013 , Conference Paper)
Interfaces are recognized as an important mechanism to define contracts governing interactions between semi-independent software modules. Well-designed interfaces significantly reduce software complexity and ease maintainability ...
A hierarchical, autonomous, and forecasting cloud IDS
(
IEEE
, 2013 , Conference Paper)
Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ...
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
(
IEEE
, 2013 , Conference Paper)
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ...
A distributed control approach for autonomic performance management in cloud computing environment
(
IEEE Computer Society
, 2013 , Conference Paper)
In this paper, a distributed control based performance management approach is developed for a general class of web services deployed in a cloud computing environment. This approach is developed using interaction balance ...
Preference-based semantic matching of web service security policies
(
IEEE
, 2013 , Conference Paper)
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
A model-based approach to self-protection in computing system
(
Association for Computing Machinery, Inc
, 2013 , Conference Paper)
This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
A framework for optimizing the supply chain performance of a steel producer
(2013 , Conference Paper)
Supply Chain Management (SCM) is focused on developing, optimizing, and operating efficient supply chains. Efficient supply chains are characterized by cost effective decisions, lean flow and structure, high degree of ...
A FCM and SURF based algorithm for segmentation of multispectral face images
(
IEEE
, 2013 , Conference Paper)
In this paper, we propose a novel clustering algorithm based on Fuzzy C-Means (FCM) and Speeded-Up Robust Feature (SURF) for multispectral image segmentation. In the experiments, color images and multispectral images from ...
Aqueous electrolyte system for porous silicon using electrochemical anodization
(
IEEE Xplore
, 2013 , Conference Paper)
Electrochemical anodization on n-type silicon was performed with silicon as anode and platinum as cathode in a weak-acid aqueous electrolyte containing orthophosphoric acid and ammonium fluoride. Anodization was carried ...