Search
Now showing items 1-10 of 521
A Model-driven Approach to the development of a PBL Script Editor
(
Global Chinese Conference on Computers in Education (GCCCE)
, 2013 , Article)
Designing a pedagogically sound and technically executable collaboration script is a highly complex,
time-consuming and error-prone task. This paper presents a model-driven approach to enable practitioners to design
online ...
Cooperative Q-learning techniques for distributed online power allocation in femtocell networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ...
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
Q-Map Application for Enrichment of a Mobile Directory Assistance Service
(
NCCIT 2010
, 2010 , Article)
The project described in this paper involves designing and developing a mobile map application, called the Qatar Map (Q-Map), which supports a telephone directory assistance service that runs over the terrestrial cellular ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
Establishing trust in cloud computing
(
IEEE Computer Society
, 2010 , Article)
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...