Computer Science & Engineering: Recent submissions
Now showing items 641-660 of 2426
-
Social-sensor cloud service for scene reconstruction
( Springer Verlag , 2017 , Conference)We propose a new social-sensor cloud services selection framework for scene reconstruction. The proposed research represents social media data streams, i.e., images' metadata and related posted information, as social sensor ... -
Web service cost optimization
( Association for Computing Machinery, Inc , 2015 , Conference)Cloud computing has become a major building block for Web applications where the service providers provide the costumers with Web services performing certain tasks so the system developers can use these services instead ... -
Scalable Containerized Pipeline for Real-time Big Data Analytics
( IEEE Computer Society , 2022 , Conference)With the widespread usage of IoT, processing data streams in real-time have become very important. The traditional data-stream processing systems are inefficient in processing big data for detecting anomalies, classifications, ... -
Crowd Counting: A Survey of Machine Learning Approaches
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Crowd counting is applied in many areas including efficient resources allocation and effective management of emergency situations. In this paper, we survey and compare various crowd counting methods. Additionally, we ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Preference-based semantic matching of web service security policies
( IEEE , 2013 , Conference)This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE. -
Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
( John Wiley and Sons Ltd , 2023 , Article)The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack ... -
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark
( Springer , 2020 , Article)Nowadays, video cameras are increasingly used for surveillance, monitoring, and activity recording. These cameras generate high resolution image and video data at large scale. Processing such large scale video streams to ... -
Attack Prediction Models for Cloud Intrusion Detection Systems
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ... -
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
( IEEE , 2013 , Conference)Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ... -
Towards Proactive Fault Management of Enterprise Systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ... -
Addressing security compatibility for multi-tenant cloud services
( Inderscience Publishers , 2013 , Article)This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ... -
Security oriented service composition: A framework
( IEEE , 2012 , Conference)This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ... -
A predictive control approach for fault management of computing systems
( Association for Computing Machinery , 2015 , Conference)In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ... -
Modeling security importance and preferences of software services
( IEEE , 2012 , Conference)This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of ... -
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ... -
Multiview topological data analysis for crowdsourced service supply-demand gap prediction
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The widespread of smart devices equipped with high sensing capabilities opened the door to the new paradigm of mobile crowdsourcing. This paradigm relies on the crowd contribution and participation to collect data and ... -
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ... -
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
( Springer Verlag , 2014 , Conference)Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ... -
Optimal inconsistency repairing of pairwise comparison matrices using integrated linear programming and eigenvector methods
( Hindawi Publishing Corporation , 2014 , Article)Satisfying consistency requirements of pairwise comparison matrix (PCM) is a critical step in decision making methodologies. An algorithm has been proposed to find a new modified consistent PCM in which it can replace the ...