This paper presents a recovery algorithm for service execution failure in the context of concurrent process execution. The recovery algorithm was specifically designed to support a rule-based approach to user-defined correctness in execution environments that support a relaxed form of isolation for service execution. Data dependencies are analyzed from data changes that are extracted from […]
Archives for October 2012
PDE-Based Enhancement of Color Images in RGB Space
A novel method for color image enhancement is proposed as an extension of the scalar-diffusion-shock-filter coupling model, where noisy and blurred images are denoised and sharpened. The proposed model is based on using the single vectors of the gradient magnitude and the second derivatives as a manner to relate different color components of the image. […]
Stateless Multicast Protocol for Ad Hoc Networks
Multicast routing protocols typically rely on the a priori creation of a multicast tree (or mesh), which requires the individual nodes to maintain state information. In dynamic networks with bursty traffic, where long periods of silence are expected between the bursts of data, this multicast state maintenance adds a large amount of communication, processing, and […]
IGNOU MCA SOFTWARE PROJECTS | IGNOU MCA PROJECTS
IGNOU MCA SOFTWARE PROJECTS IGNOU PROJECTS JAVA BASED PROJECTS DOMAIN: TRANSACTIONS ON DATA MINING DOMAIN: TRANSACTIONS WEB APPLICATIONS (J2EE) DOMAIN: TRANSACTIONS ON NETWORKING DOMAIN: TRANSACTIONS ON NETWORKING SECURITY DOMAIN: TRANSACTIONS ON SOFTWARE ENGINEERING DOMAIN: TRANSACTIONS ON CLOUD COMPUTING DOMAIN: TRANSACTIONS ON WEB SERVICES DOMAIN: TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING DOMAIN: TRANSACTIONS ON GRID COMPUTING […]
Robust Watermarking of Compressed and Encrypted JPEG2000 Images
Digital asset management systems (DAMS) generally handle media data in a compressed and encrypted form. It is sometimes necessary to watermark these compressed encrypted media items in the compressed-encrypted domain itself for tamper detection or ownership declaration or copyright management purposes. It is a challenge to watermark these compressed encrypted streams as the compression process […]
Risk-Aware Mitigation for MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically […]
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing attribute-based encryption (ABE) have been proposed for access […]
Network Assisted Mobile Computing with Optimal Uplink Query Processing
Many mobile applications retrieve content from remote servers via user generated queries. Processing these queries is often needed before the desired content can be identified. Processing the request on the mobile devices can quickly sap the limited battery resources. Conversely, processing user-queries at remote servers can have slow response times due communication latency incurred during […]
A Venture Perspective on Cloud Computing
As a result of the impact of the Web, cloud computing, and mobility, technology companies must radically rethink how they build, package, deploy, market, and sell their solutions. Cloud and mobile computing appear to represent yet another software architecture change. These platform shifts have happened almost every decade and take some time to standardize. Recognizing […]