Background: For developing Web-based applications, there exist several competing and widely used technological platforms (consisting of a programming language, framework(s), components, and tools), each with an accompanying development culture and style. Research question: Do Web development projects exhibit emergent process or product properties that are characteristic and consistent within a platform, but show relevant substantial […]
Archives for February 2012
ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks
we propose an Attribute-Based Access Control System (ABACS) for emergency services with security assurance over Vehicular Ad Hoc Networks (VANETs). ABACS aims to improve the efficiency of rescues mobilized via emergency communications over VANETs. By adopting fuzzy identity-based encryption, ABACS can select the emergency vehicles that can most appropriately deal with an emergency and securely […]
Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme
This paper explores integrating a reputation-based trust mechanism with an agent-based backup protection system to help protect against malicious or byzantine failures. A distributed cooperative trust system has the potential to add an additional layer of protection designed to operate with greater autonomy. This trust component enables the agents in the system to make assessments […]
Scheduling Grid Tasks in Face of Uncertain Communication Demands
Grid scheduling is essential to Quality of Service provisioning as well as to efficient management of grid resources. Grid scheduling usually considers the state of the grid resources as well application demands. However, such demands are generally unknown for highly demanding applications, since these often generate data which will be transferred during their execution. Without […]
Data Replication in Data Intensive Scientific Applications with Performance Guarantee
Data replication has been well adopted in data intensive scientific applications to reduce data file transfer time and bandwidth consumption. However, the problem of data replication in Data Grids, an enabling technology for data intensive applications, has proven to be NP-hard and even non approximable, making this problem difficult to solve. Meanwhile, most of the […]
A Venture Perspective on Cloud Computing
As a result of the impact of the Web, cloud computing, and mobility, technology companies must radically rethink how they build, package, deploy, market, and sell their solutions. Cloud and mobile computing appear to represent yet another software architecture change. These platform shifts have happened almost every decade and take some time to standardize. Recognizing […]
Supply Chain as a Service: A Cloud Perspective on Supply Chain Systems
Supply chains are characterized by multiple firms providing their resources and processes to meeting customer demand in an efficient manner. There exists a great variety of approaches for solving the inherent coordination problem. It has been acknowledged that the autonomy of supply chain participants – and their business objectives – as well as the contractual […]
An Optimum Land Cover Mapping Algorithm in the Presence of Shadows
Occurrence of shadowy pixels in remote sensing images is a common phenomenon particularly with passive sensors. In these cases, analysts may mistakenly treat these pixels as a separate land cover class. This may result in the loss of information present in the shadow pixels A better approach may be to correct light intensity values in […]
A new chaos-based cryptosystem for secure transmitted images
This paper presents a novel and robust chaos-based cryptosystem for secure transmitted images and four other versions. In the proposed block encryption/decryption algorithm, a 2D chaotic map is used to shuffle the image pixel positions. Then, substitution (confusion) and permutation (diffusion) operations on every block, with multiple rounds, are combined using two perturbed chaotic PWLCM […]