Browsing Computer Science & Engineering by Title
Now showing items 1776-1795 of 2288
-
Rational Contracts: Data-driven Service Provisioning in Blockchain-powered Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Smart Contracts (SCs), which are software programs that run on blockchain platforms, provide appealing security guarantees characterized by decentralized, autonomous, and verifiable execution. On the other hand, Service ... -
Re-parameterization reduces irreducible geometric constraint systems
( Elsevier Ltd , 2016 , Article)You recklessly told your boss that solving a non-linear system of size n (n unknowns and n equations) requires a time proportional to n, as you were not very attentive during algorithmic complexity lectures. So now, you ... -
Re-ranking web search results for better fact-checking: A preliminary study
( Association for Computing Machinery , 2018 , Conference Paper)Even though Web search engines play an important role in finding documents relevant to user queries, there is little to no attention given to how they perform in terms of usefulness for fact-checking claims. In this paper, ... -
Real-time automated image segmentation technique for cerebral aneurysm on reconfigurable system-on-chip
( Elsevier B.V. , 2018 , Article)© 2018 Elsevier B.V. Cerebral aneurysm is a weakness in a blood vessel that may enlarge and bleed into the surrounding area, which is a life-threatening condition. Therefore, early and accurate diagnosis of aneurysm is ... -
Real-time data center's telemetry reduction and reconstruction using markov chain models
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Large-scale data centers are composed of thousands of servers organized in interconnected racks to offer services to users. These data centers continuously generate large amounts of telemetry data streams (e.g., hardware ... -
Real-time Imitation of Autonomous MCG Node using Dual ECG Probing IoT Node Suitable for Delivery by UAV
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)The gigantic increase in population, social isolation, and mobility constraint lifestyle since the COVID-19 era has resulted in challenges like remote availability of critical bio-instrumentation like magnetocardiography ... -
Real-time implementation and evaluation of an adaptive energy-aware data compression for wireless EEG monitoring systems
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Wireless sensor technologies can provide the leverage needed to enhance patient-caregivers collaboration through ubiquitous access and direct communication, which promotes smart and scalable vital sign monitoring of the ... -
Real-time traffic surveillance using ZigBee
( Institute of Electrical and Electronics Engineers Inc. , 2010 , Conference Paper)This paper describes the design, implementation, and analysis of a proof-of-concept prototype of a traffic surveillance system. The system employs an in-vehicle device for collecting real-time traffic data. The device uses ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Recent advances in mobile touch screen security authentication methods: A systematic literature review
( Elsevier Ltd , 2019 , Article Review)The security of the smartphone touch screen has attracted considerable attention from academics as well as industry and security experts. The maximum security of the mobile phone touch screen is necessary to protect the ... -
Recent progress in generative adversarial networks applied to inversely designing inorganic materials: A brief review
( Elsevier B.V. , 2022 , Other)Generative adversarial networks (GANs) are deep generative models (GMs) that have recently attracted attention owing to their impressive performance in generating completely novel images, text, music, and speech. Recently, ... -
Recognition of off-line handwritten Arabic words using neural network
( IEEE , 2006 , Conference Paper)Neural network (NN) have been used with some success in recognizing printed Arabic words. In this paper, a complete scheme for unconstrained Arabic handwritten word recognition based on a Neural network is proposed and ... -
Recommender systems using harmonic analysis
( IEEE Computer Society , 2015 , Conference Paper)Recommender systems provide recommendations on variety of personal activities or relevant items of interest. They can play a significant role for E-commerce and in daily personal decisions. However, existing recommender ... -
Reconfigurable self-calibrated multi-sensing RFID-based platform
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)This paper concerns an RFID tag platform using an integrated temperature sensor and external pressure sensor targeted for the Electronics Product Code (EPC) Gen-2 standard operating in the 902-928 MHz ISM band. The developed ... -
Reconfigurable swarm robots for structural health monitoring: a brief review
( Springer , 2017 , Article)Autonomous monitoring of infrastructure systems offers a promising alternative to manual inspection techniques which are mostly tedious, expensive and prone to error. Robot-based autonomous monitoring systems not only ... -
Region of Interest Optimization for Delay-sensitive Telemedicine Applications
( IEEE , 2022 , Conference Paper)Telemedicine is a rising technology that is gaining a lot of interest in the recent decades. Several applications of telemedicine are delay-sensitive and need to be operated in real-time. One of which is surgical tele-mentoring ... -
Regional failure survivability for cloud networking services using post fault restoration
(2013 , Conference Paper)Cloud computing services are being adopted to expand applications across dispersed data-center sites. As these new paradigms require active data exchange, they impose further virtual network (VN) mappings over operator ... -
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
( Elsevier B.V. , 2021 , Article)Emerging technological innovation toward e-Health transition is a worldwide priority for ensuring people's quality of life. Hence, secure exchange and analysis of medical data amongst diverse organizations would increase ... -
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)A 5G network is the key driving factor in the development of vehicle-to-vehicle (V2V) communication technology, and V2V communication in 5G has recently attracted great interest. In the V2V communication network, users can ...