Search
Now showing items 91-100 of 169
A non-inclusive memory permissions architecture for protection against cross-layer attacks
(
IEEE
, 2014 , Conference Paper)
Protecting modern computer systems and complex software stacks against the growing range of possible attacks is becoming increasingly difficult. The architecture of modern commodity systems allows attackers to subvert ...
RSU cloud and its resource management in support of enhanced vehicular applications
(
IEEE
, 2014 , Conference Paper)
We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety application with QoS for VANETs. The architecture of RSU Clouds is delineated, and consists of traditional RSUs and specialized micro-datacenters and ...
Haralick feature extraction from time-frequency images for epileptic seizure detection and classification of EEG data
(
IEEE
, 2014 , Conference Paper)
This paper presents novel time-frequency (t-f) features based on t-f image descriptors for the automatic detection and classification of epileptic seizure activities in EEG data. Most previous methods were based only on ...
Distributed cross-layer optimization for healthcare monitoring applications
(
IEEE Computer Society
, 2014 , Conference Paper)
Mobile Health (mHealth) systems leverage wireless and mobile communication technologies to provide healthcare stakeholders with innovative tools and solutions that can revolutionize healthcare provisioning. Body Area Sensor ...
Towards energy efficient relay placement and load balancing in future wireless networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
This paper presents an energy efficient relay deployment algorithm that determines the optimal location and number of relays for future wireless networks, including Long Term Evolution (LTE)-Advanced heterogeneous networks. ...
Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article Review)
The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ...
Small data dissemination for wireless sensor networks: The security aspect
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For security reasons every disseminated data ...
A model-based validated autonomic approach to self-protect computing systems
(
IEEE
, 2014 , Article)
This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting system, which has the ability to autonomously ...
Digitization and spectral analysis of Historical Manuscripts
(
IEEE
, 2014 , Conference Paper)
Digitization is an efficient means of preserving the rare historical records led to the development of a large number of digital libraries across the world. Choice of the suitable imaging equipment, storage format, and ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...