Search
Now showing items 41-50 of 102
Trust in cloud services: Providing more controls to clients
(
IEEE
, 2013 , Article)
Trust is more important than money and will ultimately determine cloud computing's success.
An integrated e-learning system for MID and MLD children in Qatar
(
IEEE
, 2013 , Conference Paper)
Children with Moderate Intellectual Disability (MID) and those with Moderate Learning Disability (MLD) are growing up with extensive exposure to computer technology. Computers and computer-related devices have the potential ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Distributed binary consensus algorithm and wireless sensor network
(
IEEE
, 2013 , Conference Paper)
We consider the design and implementation of the binary consensus algorithm in wireless sensor networks (WSN) under real life environment. This algorithm is applied for the evaluation of a consensus of a measured values ...
General learning approach for event extraction: Case of management change event
(
SAGE Publications Ltd
, 2013 , Article)
Starting from an ontology of a targeted financial domain corresponding to transaction, performance and management change news, relevant segments of text containing at least a domain keyword are extracted. The linguistic ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Facilitating Teachers in Developing Online PBL Courses
(
IEEE
, 2013 , Conference Paper)
Developing a sound online problem-based learning (PBL) course plan is difficult because teachers need comprehensive PBL and technical knowledge. This paper proposes a model-driven approach to develop a PBL authoring tool ...
Incentive scheduler algorithm for cooperation and coverage extension in wireless networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
In this paper, we focus on wireless coverage extension and nodes' cooperation. We propose a new protocol based on an incentive approach and a scheduling algorithm to reward cooperative nodes. The cost of cooperation can ...
Systolic architecture for hardware implementation of two-dimensional non-separable filter-bank
(
IEEE
, 2013 , Conference Paper)
In this paper, we present an efficient poly-phase decomposition scheme for implementation of 2-D non-separable filter bank. Poly-phase decomposition scheme offers multiplexing of filter bank computations or/and reduce the ...
An improved palmprint recognition system using iris features
(
Springer
, 2013 , Article)
This paper presents a bimodal biometric recognition system based on the extracted features of the human palmprint and iris using a new graph-based approach termed Fisher locality preserving projections (FLPP). This new ...