بحث بسيط
السجلات المعروضة 91 -- 100 من 102
Automatic handedness detection from off-line handwriting
(
IEEE
, 2013 , Conference Paper)
In forensics, the handedness detection or the classification of writers into left or right-handed helps investigators focusing more on a certain category of suspects. However, only a few studies have been carried out in ...
Securing vehicle-to-grid communications in the smart grid
(2013 , Article)
Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ...
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
(
IEEE
, 2013 , Conference Paper)
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ...
Optimum power and rate allocation in video sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
In a sensor network, each sensor has a limited energy supply. Therefore, it is critical to minimize the power consumed by each sensor to maximize its lifetime. Video sensor networks differ from conventional sensor networks ...
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)
Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
Resource allocation with incomplete information for QoE-driven multimedia communications
(2013 , Article)
Most existing Quality of Experience (QoE)-driven multimedia resource allocation methods assume that the QoE model of each user is known to the controller before the start of the multimedia playout. However, this assumption ...
Preference-based semantic matching of web service security policies
(
IEEE
, 2013 , Conference Paper)
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
Improving macrocell downlink throughput in rayleigh fading channel environment through femtocell user cooperation
(2013 , Article)
This paper studies cooperative techniques that rely on femtocell user diversity to improve the downlink communication quality of macrocell users. We analytically derive and evaluate the achievable performance of these ...
A model-based approach to self-protection in computing system
(
Association for Computing Machinery, Inc
, 2013 , Conference Paper)
This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...