بحث بسيط
السجلات المعروضة 31 -- 40 من 47
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
(
Elsevier B.V.
, 2019 , Article)
In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living
(
Elsevier
, 2015 , Article)
This research aims to describe pattern recognition models for detecting behavioural and health-related changes in a patient who is monitored continuously in an assisted living environment. The early anticipation of anomalies ...
Web Application Resource Requirements Estimation Based on the Workload Latent Features
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Most cloud computing platforms offer reactive resource auto-scaling mechanisms for dealing with variable traffic patterns to deliver the desired QoS properties while keeping low provisioning costs. However, a range of ...
Web service cost optimization
(
Association for Computing Machinery, Inc
, 2015 , Conference Paper)
Cloud computing has become a major building block for Web applications where the service providers provide the costumers with Web services performing certain tasks so the system developers can use these services instead ...
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
QoS optimization for cloud service composition based on economic model
(
Springer Verlag
, 2015 , Conference Paper)
Cloud service composition is usually long term based and economically driven. Services in cloud computing can be categorized into two groups: Application services and Computing Services. Compositions in the application ...
Secure policy execution using reusable garbled circuit in the cloud
(
Elsevier B.V.
, 2018 , Article)
While cloud computing is fairly mature, there are underpinning data privacy and confidentiality issues that have yet to be resolved by existing security solutions such as cross domain access control policies. The latter ...
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...