Browsing Computer Science & Engineering by Title
Now showing items 1860-1879 of 2288
-
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD ... -
SCADA system testbed for cybersecurity research using machine learning approach
( MDPI AG , 2018 , Article)This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in ... -
Scalable Containerized Pipeline for Real-time Big Data Analytics
( IEEE Computer Society , 2022 , Conference Paper)With the widespread usage of IoT, processing data streams in real-time have become very important. The traditional data-stream processing systems are inefficient in processing big data for detecting anomalies, classifications, ... -
Scalable multi-core implementation for motif finding problem
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)The motif finding problem is a key step for understanding the gene regulation and expression, drug design, disease resistance, etc. Many sequential algorithms have been proposed in the literature to find the exact motifs. ... -
Scalable real-time energy-efficient EEG compression scheme for wireless body area sensor network
( Elsevier Ltd , 2015 , Article)Recent technological advances in wireless body sensor networks have made it possible for the development of innovative medical applications to improve health care and the quality of life. By using miniaturized wireless ... -
Scalable spectrum database construction mechanisms for efficient wideband spectrum access management
( Elsevier B.V. , 2021 , Article)We propose a novel framework for enabling scalable database-driven dynamic spectrum access and sharing of heterogeneous wideband spectrum. The proposed framework consists of two complementary approaches that exploit the ... -
ScalNet: A novel network architecture for data centers
( IEEE , 2015 , Conference Paper)This paper presents the design, implementation and evaluation of ScalNet, novel network architecture for data centers. ScalNet is a cost-effective, high- performance and scalable interconnect with almost flat architecture. ... -
Scratch-DKG: A Framework for Constructing Scratch Domain Knowledge Graph
( IEEE Computer Society , 2022 , Article)With the rapid development of programming platforms, how to utilize the tremendous amount of data produced by the platforms, such as Scatch, has been a big challenge to researchers. The growing data is not only huge, but ... -
Scratch-Rec: a novel Scratch recommendation approach adapting user preference and programming skill for enhancing learning to program
( Springer , 2022 , Article)Among teenagers, online programming learning platforms, such as Scratch, have obtained promising achievements for guiding beginners. However, with the ever-growing number of users, there is an urgent issue that learners ... -
An SDN Architecture for AUV-Based Underwater Wireless Networks to Enable Cooperative Underwater Search
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)With the emergence of new underwater ICTs, UWNs based on AUV have become the mainstream technology for underwater search tasks. These advanced underwater searching technologies are leading to smart perceptual ocean ... -
SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study
( Association for Computing Machinery , 2021 , Book Review)Software-defined networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The controller in the control plane is the ... -
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
( Springer Verlag , 2019 , Article)The Vehicular Ad hoc Networks (VANETs) are emerging networks that provide essential services to drivers on the road. To exchange data, vehicles as network nodes route information between source and destination using the ... -
Sea water salinity detection using circular fringes formation based on diffraction of laser light
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Salinity describes the amount of salt dissolved in water and brininess of water makes it unsuitable for drinking, industrial and agriculture use. The sea water salinity is most often detected by total dissolved salt method ... -
Seamless Handoffs in Wireless HetNets: Transport-Layer Challenges and Multi-Path TCP Solutions with Cross-Layer Awareness
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Complications and performance issues resulting from handoffs have widely been overlooked by transport layer protocols. In mobile scenarios, layer 2 protocols begin to see issues, especially when multiple handoffs are ... -
SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the emergence of application areas such as the Internet of Drones (IoD). They are finding wide applicability in areas ranging from package delivery ... -
SecCom: A prototype for integrating security-aware components
( Springer Verlag , 2009 , Conference Paper)This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ... -
Secret Key Agreement for Data Dissemination in Vehicular Platoons
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In a vehicular platoon, the lead vehicle that is responsible for managing the platoon's moving directions and velocity periodically disseminates messages to the following automated vehicles in a multi-hop vehicular network. ... -
Secret key generation based on AoA estimation for low SNR conditions
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ... -
Secret key generation based on channel and distance measurements
( IEEE Computer Society , 2014 , Conference Paper)Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ... -
Secure and distributed data discovery and dissemination in wireless sensor networks
( IEEE Computer Society , 2015 , Article)A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...