Search
Now showing items 81-90 of 95
Binary consensus in sensor motes
(
IEEE
, 2013 , Conference Paper)
In this work, we adapt the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question ...
Open Education Resources and Mobile Technology to Narrow the Learning Divide
(
Athabasca University Press
, 2013 , Article)
As the world becomes more digitized, there will be an increasing need to make available learning resources in electronic format for access by information and communication technologies. The question education will face is ...
Digital library initiative: A project for educators in qatar
(
Association for Computing Machinery
, 2013 , Article)
This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ...
Use of mobile learning apps in workplace learning
(
IEEE Computer Society
, 2013 , Article)
Organizations are starting to use mobile learning to train workers and to provide professional development of workers so that they can function on the job. The training can be delivered using mobile apps which provides the ...
Role of contextual properties in enterprise service migration to cloud computing
(
John Wiley and Sons Ltd
, 2013 , Article Review)
This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Trust in cloud services: Providing more controls to clients
(
IEEE
, 2013 , Article)
Trust is more important than money and will ultimately determine cloud computing's success.
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Parametric modeling of EEG signals with real patient data for simulating seizures and pre-seizures
(
IEEE
, 2013 , Conference Paper)
Numerous theories and models have been developed to associate various findings or in relating EEG patterns to develop a software simulators. In this paper, a Dynamic model for simulating the EEG signal has been developed ...