Search
Now showing items 1631-1640 of 1898
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
(
IEEE
, 2013 , Conference Paper)
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ...
LingoSnacks: M-Learning platform for language learning
(
IEEE
, 2012 , Conference Paper)
This paper reports the experience of designing and developing a multimedia m-Learning platform (named LingoSnacks) for interactive learning of Arabic spelling and vocabulary. It uses interactive game-like delivery methods ...
A distributed control approach for autonomic performance management in cloud computing environment
(
IEEE Computer Society
, 2013 , Conference Paper)
In this paper, a distributed control based performance management approach is developed for a general class of web services deployed in a cloud computing environment. This approach is developed using interaction balance ...
Applying and evaluating architectural patterns on a stock trading case study
(
IEEE
, 2012 , Conference Paper)
Teaching architectural and design patterns is a difficult task and not easy to understand by the students as patterns are expressed at a higher abstraction level than programming language constructs or graphical UML ...
Preference-based semantic matching of web service security policies
(
IEEE
, 2013 , Conference Paper)
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
Towards Proactive Fault Management of Enterprise Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ...
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
(
Springer Verlag
, 2014 , Conference Paper)
Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ...
Security oriented service composition: A framework
(
IEEE
, 2012 , Conference Paper)
This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ...