بحث بسيط
السجلات المعروضة 11 -- 20 من 27
Accountable and privacy-enhanced access control in wireless sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who ...
Malicious-proof and fair credit-based resource allocation techniques for DSA systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum ...
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
Asynchronous flow scheduling for green ambient assisted living communications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
AAL applications that support users (in particular, the elderly and patients) in staying at home are increasingly becoming popular in health care systems. Basically, these AAL applications provide personal information ...
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...
Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Energy consumption has become a significant concern for cloud service providers due to financial as well as environmental factors. As a result, cloud service providers are seeking innovative ways that allow them to reduce ...
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ...
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
An Efficient Distributed Trust Model for Wireless Sensor Networks
(
IEEE Computer Society
, 2015 , Article)
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes ...
Millimeter-wave multimedia communications: Challenges, methodology, and applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The worldwide opening of a massive amount of unlicensed millimeter-wave spectrum has triggered great interest in developing high-bit-rate multimedia services and applications. Specific challenges for mmWave communication ...