College of Engineering: المرسلات الحديثة
السجلات المعروضة 1281 -- 1300 من 8768
-
SecCom: A prototype for integrating security-aware components
( Springer Verlag , 2009 , Conference)This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ... -
Tracking and constraining authorization provenance
( Springer Berlin Heidelberg , 2012 , Conference)Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ... -
Cloud computing without seeing
( Association for Computing Machinery , 2011 , Conference)In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ... -
A machine learning-based optimization approach for pre-copy live virtual machine migration
( Springer , 2023 , Article)Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ... -
Understanding the Impact of Emotions on the Quality of Software Artifacts
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)This paper proposes a framework for investigating the impact of emotions on the quality of software artifacts and portrays some observations captured during the development of several software engineering projects. The ... -
Distributed Framework via Block-chain Smart Contracts for Smart Grid Systems against Cyber-Attacks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)In this century, the demand for energy is increasing daily, and the need for energy resources has become urgent and inevitable. New ways of generating energy, such as renewable resources that depend on many sources, including ... -
Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ... -
Live migration of virtual machine memory content in networked systems
( Elsevier , 2022 , Article Review)Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ... -
Garbled computation in cloud
( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Managing Security Control Assumptions Using Causal Traceability
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ... -
Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator
( Elsevier , 2020 , Conference)Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ... -
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ... -
Wireless application deploying cell broadcast, and bulk SMS/MMS
( International Business Information Management Association, IBIMA , 2009 , Conference)Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ... -
MB-C: Check-in mobile application using barcodes
( International Business Information Management Association, IBIMA , 2008 , Conference)This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ... -
Altmetrics for country-level research assessment
( Springer Verlag , 2014 , Article)Changes are occurring in scholarly communication and the geography of science.Policymakersand research funding agencies are looking for ways to measure the comprehensive impact of research and benefit from the research ... -
Workplace learning using mobile technology: A case study in the oil and gas industry
( Springer Verlag , 2014 , Article)This article presents an innovative project using mobile technology to train workers in the oil and gas industry to develop their communication skills while functioning on the job. The training was delivered on mobile ... -
Digital library initiative: A project for educators in qatar
( Association for Computing Machinery , 2013 , Article)This article presents the first phase of an exciting initiative in the Arabian Gulf State of Qatar that brings together four academic institutions working to develop a digital library infrastructure of people, services, ... -
Business process reengineering in UAE public sector: A town planning case study
( Emerald Group Publishing Limited , 2007 , Article)Purpose - To reengineer the applications' processes of the land department of Al-Ain Municipality and to develop an electronic version of the reengineered processes. Design/methodology/approach - The research approach used ... -
Model for transforming engineering education using technology-enhanced learning
( Springer International Publishing , 2015 , Book chapter)Engineering education is important for all countries to progress and to be competitive in the twenty-first century. This is especially true for countries in the Middle East and North Africa (MENA), which are developing ... -
Service Chaining for NFV and Delivery of Other Applications in a Global Multi-cloud Environment
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)Network Function Virtualization (NFV) allows Internet Service Providers (ISPs) to implement key function modules, such as, BRAS (Broadband Remote Access Server), IMS (Internet Multimedia System), etc. in virtual machines ...