Browsing Computer Science & Engineering by Title
Now showing items 1355-1374 of 2202
-
Managing Security Control Assumptions Using Causal Traceability
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ... -
The many benefits of annotator rationales for relevance judgments
( International Joint Conferences on Artificial Intelligence , 2017 , Conference Paper)When collecting subjective human ratings of items, it can be difficult to measure and enforce data quality due to task subjectivity and lack of insight into how judges arrive at each rating decision. To address this, we ... -
Market-Based Model in CR-IoT: A QProbabilistic Multi-agent Reinforcement Learning Approach
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The ever-increasing urban population and the corresponding material demands have brought unprecedented burdens to cities. To guarantee better QoS for citizens, smart cities leverage emerging technologies such as the Cognitive ... -
MARL: Multimodal Attentional Representation Learning for Disease Prediction
( Springer Science and Business Media Deutschland GmbH , 2021 , Conference Paper)Existing learning models often utilise CT-scan images to predict lung diseases. These models are posed by high uncertainties that affect lung segmentation and visual feature learning. We introduce MARL, a novel Multimodal ... -
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students
( Elsevier B.V. , 2006 , Article)The growth and advancement in the Internet and the World Wide Web has led to an explosion in the amount of available information. This staggering amount of information has made it extremely difficult for users to locate ... -
MASACAD: a multiagent based approach to information customization
( IEEE , 2006 , Article)MASACAD is a multiagent information customization system that adopts the machine-learning paradigm to advise students by mining the Web. In the distributed problem-solving paradigm, systems can distribute among themselves ... -
Mathematical Evaluation of Human Immune Systems for Securing Software Defined Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. ... -
Matrix Barcode Based Secure Authentication without Trusting Third Party
( IEEE Computer Society , 2019 , Article)The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code every time to use secure servers. The mobile device generates a secret to encrypt his/her credentials and saves it so that ... -
Maximal fuzzy supplement frequent pattern mining based on advanced pattern-aware dynamic search strategy and an effective FSFP-array technique
( IOS Press , 2018 , Article)The proper expression of the potentially useful but hidden information in large-scale datasets via using proper structure is vital important in both theory and applications of advanced pattern mining. The fundamental ... -
Maximizing energy efficiency for loss tolerant applications: The packet buffering case
( IEEE , 2013 , Conference Paper)Energy efficient communication has emerged as one of the key areas of research due to its impact on industry and environment. Any potential degree of freedom (DoF) available in the system should be exploited smartly to ... -
Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
( IEEE , 2015 , Article)Quality of service (QoS) for a network is characterized in terms of various parameters specifying packet delay and loss tolerance requirements for the application. The unpredictable nature of the wireless channel demands ... -
Maximizing Lifetime in Wireless Sensor Network for Structural Health Monitoring with and Without Energy Harvesting
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)This paper presents an optimization framework to maximize the lifetime of wireless sensor networks for structural health monitoring with and without energy harvesting. We develop a mathematical model and formulate the ... -
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ... -
MB-C: Check-in mobile application using barcodes
( International Business Information Management Association, IBIMA , 2008 , Conference Paper)This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ... -
Measuring and optimising performance of an offline text writer identification system in terms of dimensionality reduction techniques
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Usually, most of the data generated in real-world such as images, speech signals, or fMRI scans has a high dimensionality. Therefore, dimensionality reduction techniques can be used to reduce the number of variables in ... -
MEdge-Chain: Leveraging Edge Computing and Blockchain for Efficient Medical Data Exchange
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Medical data exchange between diverse e-health entities can lead to a better healthcare quality, improving the response time in emergency conditions, and a more accurate control of critical medical events (e.g., national ... -
Medical IoT: A Comprehensive Survey of Different Encryption and Security Techniques
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Recently, there is a revolution in internet of things (IoT) technologies. Research advancements in this field proved to be very useful to automate daily tasks, it quickly reached the medical field resulting in the creation ... -
MeMaPads: Enhancing children's well-being through a physically interactive memory and math games
( IEEE , 2012 , Conference Paper)Obesity has recently become an epidemic that endangers the well-being of all the modern societies, especially the young generations. The lack of physical activity is considered as one major reason that contributes to such ... -
Memory footprint reduction for power-efficient realization of 2-D finite impulse response filters
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)We have analyzed memory footprint and combinational complexity to arrive at a systematic design strategy to derive area-delay-power-efficient architectures for two-dimensional (2-D) finite impulse response (FIR) filter. ... -
MESP: A Modified IPSec for Secure Multicast Communication
( IEEE , 2006 , Article)We propose the multicast encryption security protocol MESP. It is driven form the IPSEC ESP. The specification of the protocol are discussed and applied the existing IPSEC ESP. We use the existing implementation of the ...