AN EFFICIENT DATA ACCESS USING COOPERATIVE CACHING IN DISRUPTION TOLERANT NETWORKS

Disruption tolerant networks (DTNs) consist of mobile devices that contact each other opportunistically. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. Our basic idea is to intentionally cache data at a set …

Continue reading

A NOVEL DATA ACCESS SCHEME IN DISRUPTION TOLERANT NETWORKS USING COOPERATIVE CACHING

Our basic idea is to intentionally cache data at a set of network central locations (NCLs), which can be easily accessed by other nodes in the network. We develop an efficient approach to NCL selection in DTNs based on a probabilistic selection metric. The selected NCLs achieve high chances for …

Continue reading

PAIRWISE CONSTRAINTS FOR ACCELERATED LEARNING-BASED INTERACTIVE IMAGE SEGMENTATION

Image segmentation refers to the task of grouping image pixels into a meaningful partition such that pixels falling in the same group are similar to each other, and different than those in other groups, in terms of a perceptually meaningful similarity measure. Segmentation often is used as a pre-processing step …

Continue reading

A CONTRACT-BASED COOPERATIVE SPECTRUM SHARING MECHANISM

Contract theory is effective in designing incentive compatible mechanisms in a monopoly market under incomplete information, where the employer needs to sign a contract with employees before fully knowing their private information. The key idea is to offer the right contract items so that all agents have the incentive to …

Continue reading

INTERACTIVE IMAGE SEGMENTATION BASED ON ACCELERATED LEARNING USING PAIRWISE CONSTRAINTS

Segmentation often is used as a pre-processing step before higher level image processing or understanding. Manually segmenting images can be laborious and time-consuming, especially for large images, and can be prone to subjectivity. At the same time, developing a generic unsupervised segmentation algorithm that can be accurately applied to all, …

Continue reading

A MEDIATED CERTIFICATELESS ENCRYPTION SCHEME FOR SECURELY SHARING SENSITIVE INFORMATION IN PUBLIC CLOUDS

In this abstract, we propose a new mCL-PKE scheme. We present the formal security model and provide the security proof. Since our mCL-PKE scheme does not depend on the pairing-based operation, it reduces the computational overhead. Moreover, we introduce an extension of mCL-PKE scheme to efficiently encrypt data for multiple …

Continue reading

ENHANCING THE QOS SUPPORT CAPABILITY OF HYBRID NETWORKS USING QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL

The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments. The QoS support reduces end-to-end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. …

Continue reading

MCLPKE SCHEME WITHOUT USING PAIRING OPERATIONS FOR SECURE DATA SHARING IN PUBLIC CLOUDS

An advantage of using a public cloud for storage is that the provider is responsible for building and maintaining the storage infrastructure and its associated costs including power, cooling and server maintenance. We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. …

Continue reading

ENHANCING THE QOS SUPPORT CAPABILITY OF HYBRID NETWORKS USING QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL

The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments. The QoS support reduces end-to-end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. …

Continue reading

TRUSTEE-BASED SOCIAL AUTHENTICATIONS SYSTEMS FOR SECURITY

In this abstract, we aim to provide systematic study about the security of trustee-based social authentications. To this end, we first propose a novel framework of attacks that are based on the observation that users’ security are correlated in trustee-based social authentications. In these attacks, an attacker initially obtains a …

Continue reading