Computer Science & Engineering: المرسلات الحديثة
السجلات المعروضة 1641 -- 1660 من 2402
-
Authenticity detection as a binary text categorization problem: Application to Hadith authentication
( IEEE Computer Society , 2016 , Conference Paper)Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person ... -
EveTAR: A new test collection for event detection in Arabic tweets
( Association for Computing Machinery, Inc , 2016 , Conference Paper)Research on event detection in Twitter is often obstructed by the lack of publicly-available evaluation mechanisms such as test collections; this problem is more severe when considering the scarcity of them in languages ... -
ArabicWeb16: A new crawl for today's Arabic Web
( Association for Computing Machinery, Inc , 2016 , Conference Paper)Web crawls provide valuable snapshots of the Web which enable a wide variety of research, be it distributional analysis to characterize Web properties or use of language, content analysis in social science, or Information ... -
A cost-aware model for risk mitigation in Cloud computing systems
( IEEE Computer Society , 2016 , Conference Paper)Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ... -
Using conceptual reasoning for inconsistencies detection in islamic advisory opinion (Fatwas)
( IEEE Computer Society , 2016 , Conference Paper)The Islamic websites play an important role in disseminating Islamic knowledge and information about Islamic ruling. Their number and the content they provide is continuously increasing which require in-depth investigations ... -
Face Recognition in the Scrambled Domain via Salience-Aware Ensembles of Many Kernels
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)With the rapid development of Internet-of-Things (IoT), face scrambling has been proposed for privacy protection during IoT-targeted image/video distribution. Consequently, in these IoT applications, biometric verification ... -
Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data ... -
A boost converter-based ringing circuit with high-voltage gain for unipolar pulse generation
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)High-Voltage pulse generators are commonly used in biotechnology, medicine, industrial applications, food processing and drinking water purification. The dc-dc boost converter has been used before in pulsed applications ... -
A meta-framework for modeling the human reading process in sentiment analysis
( Association for Computing Machinery , 2016 , Article)This article introduces a sentiment analysis approach that adopts the way humans read, interpret, and extract sentiment from text. Our motivation builds on the assumption that human interpretation should lead to the most ... -
Optimal Polynomial Time Algorithm for Restoring Multicast Cloud Services
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)The failure-prone nature of data center networks has evoked countless contributions to develop proactive and reactive countermeasures. Yet, most of these techniques were developed with unicast services in mind. When in ... -
Prediction of Transformer Furan Levels
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)In this letter, the ranges of furan content in oil in power transformers are predicted using measurements of oil tests, such as breakdown voltage, acidity, water content, and dissolved gas analysis. Predictive models based ... -
Automated vehicle density estimation from raw surveillance videos
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)To enable an effective traffic management and signal control, it is important to know the road traffic density. In recent years, video surveillance based systems and monitoring tools have been widely used for obtaining ... -
Performance and security improvements for Tor: A survey
( Association for Computing Machinery , 2016 , Article)Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more ... -
Garbled computation in cloud
( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Delay-Aware Scheduling and Resource Optimization with Network Function Virtualization
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)To accelerate the implementation of network functions/middle boxes and reduce the deployment cost, recently, the concept of network function virtualization (NFV) has emerged and become a topic of much interest attracting ... -
Joint data and power transfer optimization for energy harvesting wireless networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Energy harvesting techniques emerge as a potential solution for prolonging the lifetime of the energy-constrained mobile wireless devices. In this paper, we focus on radio frequency (RF) energy harvesting for multiuser ... -
Analysis of discovery and access procedure for D2D communication in 5G cellular network
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Device-To-device (D2D) communication, which is defined as a direct communication between two mobile users without traversing the Base Station (BS) or the core network to offload the increasing traffic to the user equipments, ... -
Secure data access for wireless body sensor networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Recently, with the support of mobile cloud computing, large number of health-related data collected from various body sensor networks can be managed efficiently. However, it is an important and challenging issue to keep ... -
Quantifying caching effects in urban VANETs
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Most applications in urban Vehicular Ad hoc NETworks (VANETs) rely on information sharing, such as real-Time traffic information queries, advertisements, etc. However, existing data dissemination techniques cannot guarantee ... -
VALS: Vehicle-Aided location service in urban environment
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In Vehicular Ad-hoc Networks (VANETs), any vehicle uses a location service to get an up-To-date data of all vehicles' positions in its vicinity. Many location services rely on infrastructures to perform location update and ...