بحث بسيط
السجلات المعروضة 131 -- 140 من 167
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
(
Springer Verlag
, 2014 , Conference Paper)
Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
(
IEEE Computer Society
, 2014 , Article)
Clustering algorithms have emerged as an alternative powerful meta-learning tool to accurately analyze the massive volume of data generated by modern applications. In particular, their main goal is to categorize data into ...
Optimal inconsistency repairing of pairwise comparison matrices using integrated linear programming and eigenvector methods
(
Hindawi Publishing Corporation
, 2014 , Article)
Satisfying consistency requirements of pairwise comparison matrix (PCM) is a critical step in decision making methodologies. An algorithm has been proposed to find a new modified consistent PCM in which it can replace the ...
Cluster validity index based on n-sphere
(
IEEE
, 2014 , Conference Paper)
In this paper, we propose a new cluster validity index (CVI) based on geometrical shape. Classic CVIs are based on a combination of separation and compactness measures and may include a measure of overlap between clusters. ...
SmartPads: A plug-N-play configurable tangible user interface
(
Kluwer Academic Publishers
, 2014 , Article)
One common concern with video games today is the lack of physical activity they demand from the user. The design of games and tangible user interfaces (TUIs) that stimulate players and engage them into fun exercising ...
Image steganography based on LSBMR using Sobel edge detection
(
IEEE
, 2014 , Conference Paper)
Steganography is the science of embedding confidential data inside data so they can be sent to destination without suspicion. Image-steganography is the most popular type of carrier to hold information. Many algorithms ...
A quality of experience model for haptic virtual environments
(
Association for Computing Machinery
, 2014 , Article)
Haptic-based Virtual Reality (VR) applications have many merits. What is still obscure, from the designer's perspective of these applications, is the experience the users will undergo when they use the VR system. Quality ...