Browsing Computer Science & Engineering by Title
Now showing items 2058-2077 of 2211
-
Towards model-based management of database fragmentation
( USENIX Association , 2013 , Conference Paper)The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ... -
Towards NLP-based Semi-automatic Preparation of Content for Language Learning using LingoSnacks m-Learning Platform
( Institute of information System and Research Center (IISRC) , 2013 , Article)Vocabulary growth is an important element for language learning but it requires repeated and varied exposure to the new words and their usage in different context. However preparing suitable learning content for effective ... -
Towards pedagogy-driven learning design: A case study of problem-based learning design
( Springer Verlag , 2014 , Conference Paper)Existing learning design languages are pedagogy-neutral. They provide insufficient support to explicitly represent pedagogy-specific approaches such as problem-based learning (PBL). As the first step towards pedagogy-driven ... -
Towards Proactive Fault Management of Enterprise Systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ... -
Towards scalable traffic management in cloud data centers
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)Cloud Computing is becoming a mainstream paradigm, as organizations, large and small, begin to harness its benefits. This novel technology brings new challenges, mostly in the protocols that govern its underlying infrastructure. ... -
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach
( Elsevier B.V. , 2019 , Article)Nowadays, with the rapid development and wide application of Internet of Things technology, Industrial Internet of Things (IIoT) has become an essential part of industrial systems. A large number of IoT devices has enabled ... -
Towards Secure IoT Networks in Healthcare Applications: A Game Theoretic Anti-Jamming Framework
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource constrained smart devices. This makes such networks exposed to various types of malicious attacks. In particular, jamming ... -
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
( Elsevier , 2023 , Article)The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of human beings from scheduling daily activities to personalized shopping recommendations. Since the success of AI is to be ... -
Towards Sustainable Energy: A Systematic Review of Renewable Energy Sources, Technologies, and Public Opinions
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The use of renewable energy resources, such as solar, wind, and biomass will not diminish their availability. Sunlight being a constant source of energy is used to meet the ever-increasing energy need. This review discusses ... -
Towards the design of smart video-surveillance system
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Security and monitoring systems are increasingly demanding in terms of quality, reliability and flexibility especially those dedicated to video surveillance. The aim of this study is to identify some limiting factors in ... -
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ... -
Traceability for adaptive information security in the cloud
( IEEE Computer Society , 2014 , Conference Paper)One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ... -
Tracking and constraining authorization provenance
( Springer Berlin Heidelberg , 2012 , Conference Paper)Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ... -
Trading wireless information and power transfer: Relay selection to minimize the outage probability
( IEEE , 2014 , Conference Paper)This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from ... -
Trading wireless information and power transfer: Relay selection to minimize the outage probability
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from ... -
Traffic Analysis Attacks on Tor: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ... -
Traffic engineering in cloud data centers: A column generation approach
( IEEE , 2014 , Conference Paper)While many have advocated for the use of Virtual Local Area Networks (VLANs) as a way to provide scalable traffic management, finding the optimal traffic split (mapping) among VLANs to achieve load balancing has turned out ... -
Traffic Flow Estimation from Road Surveillance
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Real-time traffic analysis using the road mounted surveillance cameras present multitude of benefits. This kind of traffic video processing has become an important means for intelligent traffic management and control. The ... -
Transcoding resources forecasting and reservation for crowdsourced live streaming
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)During the last decade, empowered by the technological advances of mobile devices and the revolution of wireless mobile network access, crowdsourced live streaming has become more popular. Ensuring a stable high-quality ... -
Transformer health index estimation using orthogonal wavelet network
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)The Health Index represents a practical tool that combines the results of operating observations, field inspections, and site and laboratory testing to manage the asset and prioritize investments in capital and maintenance ...