Search
Now showing items 271-280 of 315
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
Automatic generation of optimized workflow for distributed computations on large-scale matrices
(
Springer Verlag
, 2014 , Conference Paper)
Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
(
Springer Verlag
, 2014 , Conference Paper)
Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ...
A model driven framework for secure outsourcing of computation to the cloud
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
Reasoning about security policies of services using answer set programming
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
An efficient component map generation method for prediction of gas turbine performance
(
American Society of Mechanical Engineers (ASME)
, 2014 , Conference Paper)
Improving efficiency, reliability and availability of gas turbines have become more than ever one of the main areas of interest in gas turbine research. This is mainly due to the stringent environmental regulations that ...
Fault-tolerant control of five-phase current source inverter for medium-voltage drives
(
Institution of Engineering and Technology
, 2014 , Conference Paper)
Multiphase Machines offer a promising solution to many practical challenges due to their advantages over the three phase counterparts, as fault-tolerant capability and lower torque ripple magnitude. Among different multiphase ...
An LP model for optimizing a supply chain management system for steel company
(
Newswood Limited
, 2014 , Conference Paper)
In this research, we have developed a linear programming formulation to describe Qatar steel manufacturing supply chain from suppliers to consumers. The purpose of the model is to provide answers regarding the optimal ...
Cluster validity index based on n-sphere
(
IEEE
, 2014 , Conference Paper)
In this paper, we propose a new cluster validity index (CVI) based on geometrical shape. Classic CVIs are based on a combination of separation and compactness measures and may include a measure of overlap between clusters. ...