Search
Now showing items 1121-1130 of 1167
Preference-based semantic matching of web service security policies
(
IEEE
, 2013 , Conference Paper)
This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE.
Boosting domestic energy efficiency through accurate consumption data collection
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Domestic user behavior shapes overall power consumption, necessitating the development of systems that analyze and help foster energy efficient behavior. The most important step in the process is the collection and management ...
A Bilingual Scene-To-Speech Mobile Based Application
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Scene-To-Speech (STS) is the process of recognizing visual objects in a picture or a video to say aloud a descriptive text that represents the scene. The recent advancement in convolution neural network (CNN), a deep ...
Practical and secure outsourcing of matrix computations to the cloud
(
IEEE
, 2013 , Conference Paper)
Cloud computing enables a cost effective outsourcing of storage and resource-intensive computations. Secure outsourcing of data and computation is challenging in this emerging computing model. In particular, outsourcing ...
Improving macrocell downlink throughput in rayleigh fading channel environment through femtocell user cooperation
(2013 , Article)
This paper studies cooperative techniques that rely on femtocell user diversity to improve the downlink communication quality of macrocell users. We analytically derive and evaluate the achievable performance of these ...
Modeling Family Behavior in Crowd Simulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Crowd simulation represents one of the approaches most commonly used to model human behavior in a crowd. Such simulation usually requires modeling different human structures such as individuals, groups, and friends. Most ...
Power allocation analysis for dynamic power utility in cognitive radio systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The focus of this paper is to investigate the fundamental limits of power allocation when taking into account a dynamic power pricing scheme. This paper proposes an optimal power allocation analysis for wireless systems ...
Security and privacy in emerging networks: Part II [Guest Editorial]
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article Review)
This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...
Probabilistic qualitative preference matching in long-term IaaS composition
(
Springer Verlag
, 2017 , Conference Paper)
We propose a qualitative similarity measure approach to select an optimal set of probabilistic Infrastructure-as-a-Service (IaaS) requests according to the provider's probabilistic preferences over a long-term period. The ...
Design and implementation of credit-based resource allocation protocol for DSA systems
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper designs, implements, and evaluates an efficient dynamic spectrum access (DSA) protocol for cognitive radio networks. The proposed protocol relies on the concept of credit value to allocate resources among users ...