Search
Now showing items 31-39 of 39
Probabilistic qualitative preference matching in long-term IaaS composition
(
Springer Verlag
, 2017 , Conference Paper)
We propose a qualitative similarity measure approach to select an optimal set of probabilistic Infrastructure-as-a-Service (IaaS) requests according to the provider's probabilistic preferences over a long-term period. The ...
Scalable Containerized Pipeline for Real-time Big Data Analytics
(
IEEE Computer Society
, 2022 , Conference Paper)
With the widespread usage of IoT, processing data streams in real-time have become very important. The traditional data-stream processing systems are inefficient in processing big data for detecting anomalies, classifications, ...
Mobile crowdsourced sensors selection for journey services
(
Springer Verlag
, 2018 , Conference Paper)
We propose a mobile crowdsourced sensors selection approach to improve the journey planning service especially in areas where no wireless or vehicular sensors are available. We develop a location estimation model of journey ...
An autonomic detection and protection system for denial of service attack
(
ACTA Press
, 2012 , Conference Paper)
This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ...
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
Towards model-based management of database fragmentation
(
USENIX Association
, 2013 , Conference Paper)
The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ...
LIME: Long-Term Forecasting Model for Desalination Membrane Fouling to Estimate the Remaining Useful Life of Membrane
(
Springer Science and Business Media Deutschland GmbH
, 2023 , Conference Paper)
Membrane fouling is one of the major problems in desalination processes as it can cause a severe drop in the quality and quantity of the permeate water. This paper presents a data-driven approach for long-term forecasting ...