THE processing and storage capabilities of mobile consumer devices are becoming increasingly powerful. A gamut of new mobile applications has thus emerged for providing a better quality of experience for the end users. A class of such applications commonly referred to as mobile augmented reality includes ones that enable delivery of content in response to […]
Archives for October 2013
VM-multiplexing resource allocation in Self-Organizing Clouds Computing
CLOUD computing has emerged as a compelling paradigm for deploying distributed services. Resource allocation problem in cloud systems emphasizes how to harness the multi attribute resources by multiplexing operating systems. The virtual machine (VM) technology, able to multiplex several operating systems on the same hardware and allow task execution over its VM substrates without performance […]
Task Scheduling and Software Project Planning Using ACO
The rapid development of the software industry, software companies are now facing a highly competitive market. To succeed, companies have to make efficient project plans to reduce the cost of software construction It is in medium to large-scale projects, the problem of project planning is very complex and challenging. For scheduling and staffing management, similarly […]
SWNET Cooperative Content caching policies
RECENT emergence of data enabled mobile devices and wireless-enabled data applications have fostered new content dissemination models in today’s mobile ecosystem. A list of such devices includes Apple’s iPhone, Google’s Android, Amazon’s Kindle, and electronic book readers from other vendors. The array of data applications includes electronic book and magazine readers and mobile phone Apps. […]
A Coalitional Game Approach Hybrid Wireless Networks in Cooperative packet Delivery
WIRELESS communications and networking technology is the key to supporting a variety of applications such as the safety and emergency notification and infotainment applications a coalitional game framework for carry-and-forward-based cooperative packet delivery to mobile nodes in a hybrid wireless network. The mobile nodes are rational to form coalitions to maximize their individual payoffs. A […]
Secure Routing Protocol Using MANET’S
RAPID development of Mobile Ad Hoc Networks (MANETs) has stimulated numerous wireless applications that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. MANETs feature self-organizing and independent infrastructures. Through traffic analysis, enemies may intercept transmitted packets, track our soldiers (i.e., nodes), attack the commander nodes, […]
Context-Dependent Logo Matching and Recognition CDS Logo Detection and Recognition
This paper presents a new method for logo detection and recognition based on “Context- Dependent Similarity” (CDS). It directly has as a feature the spatial context of local features. The CDS function is defined as the fixed-point of three terms: (i) an energy function which balances a fidelity term; (ii) a context criterion; (iii) an […]
Privacy Preserving Data Mining in Horizontally Distributed Databases
The problem of secure mining of association rules in horizontally partitioned databases. One of the main ingredients in our proposed protocol is a novel secure multi-party protocol for computing the union (or intersection) of private subsets that each of the interacting players hold. Another ingredient is a protocol that tests the inclusion of an element […]
Sq: Sequential Clustering for Privacy preserving data anonymization
This paper presents sequential clustering algorithms for anonymizing social networks. Those algorithms produce anonymizations by means of clustering with better utility than those achieved by existing algorithms. We devised a secure distributed version of our algorithms for the case in which the network data is split between several players. We focused on the scenario in […]
VM Resource Allocation Isolation Technology in Cloud System
CLOUD computing has emerged as a compelling paradigm for the deployment of ease-of-use virtual environment on the Internet. One typical feature of clouds is its pool of easily accessible virtualized resources (such as hardware, platform or services) that can be dynamically reconfigured to adjust to a variable load (scale). Cloud systems usually do not provision […]