Search
Now showing items 2261-2270 of 2362
Service Chaining for NFV and Delivery of Other Applications in a Global Multi-cloud Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Network Function Virtualization (NFV) allows Internet Service Providers (ISPs) to implement key function modules, such as, BRAS (Broadband Remote Access Server), IMS (Internet Multimedia System), etc. in virtual machines ...
Towards pedagogy-driven learning design: A case study of problem-based learning design
(
Springer Verlag
, 2014 , Conference Paper)
Existing learning design languages are pedagogy-neutral. They provide insufficient support to explicitly represent pedagogy-specific approaches such as problem-based learning (PBL). As the first step towards pedagogy-driven ...
A domain-specific modeling language approach to support various forms of online PBL
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Problem-based learning (PBL) can be organized and conducted in a variety of forms. By adopting a Domain-Specific Modeling Language (DSML) approach we have developed a PBL scripting language, which provides natural concepts ...
An integrated development environment for the creation and delivery of m-Learning objects
(
IEEE Computer Society
, 2014 , Conference Paper)
We live in a new era where education is not anymore restricted to grouping individuals in a room and feeding them information. We also live in the same era where we deal with our handheld devices more than any other normal ...
Multi-cloud distribution of virtual functions and dynamic service deployment: OpenADN perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Network Function Virtualization (NFV) and Service Chaining (SC) are novel service deployment approaches in the contemporary cloud environments for increased flexibility and cost efficiency to the Application Service Providers ...
Identifying contextual properties of software architecture in cloud computing
(
IEEE
, 2011 , Conference Paper)
This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...