Firewalls are critical in securing private networks of businesses, institutions, and home networks. A firewall is often placed at the entrance between a private network and the external network so that it can check each incoming or outgoing packet and decide whether to accept or discard the packet based on its policy. A firewall policy […]
The real mobile computing environment in group key management
In next-generation mobile communication, multicast service will be a key application for supporting a large group of subscribers simultaneously. Because multicast transmits data to the group simultaneously, it reduces the communication cost significantly. Since multicast may be vulnerable to an overhearing attack, this efficiency can be achieved only when security or access control is guaranteed; […]
Cryptographic Puzzle Hiding Scheme
Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. The open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. While eaves- dropping and message injection can be prevented using cryptographic […]
A Non-Parametric Patch Sampling Method
The proposed method is composed of two main and sequential operations. The first one is a non-parametric patch sampling method used to fill-in missing regions. Rather than filling in missing regions at the original resolution, the inpainting algorithm is applied on a coarse version of the input picture. There are several reasons for performing the […]
A Distributed Optimal Community-Aware Opportunistic Routing (Caor) Algorithm
Mobile social networks (MSNs) are a special kind of delay tolerant network (DTN), in which mobile users move around and communicate with each other via their carried short-distance wireless communication devices. Typical MSNs include pocket switch networks, mobile vehicular networks, mobile sensor networks. As more users exploit portable short-distance wireless communication devices (such as smart […]
A sufficient High obfuscation level
It is essential to detect inconsistencies or failures early. In manufacturing and logistic processes, items are tracked continuously to detect loss or to reroute them during transport. To answer this need complex event processing (CEP) systems have evolved as a key paradigm for business and industrial applications. CEP systems allow to detect situations by performing […]
The Prevalence Of Craigslist Based (Automobile) Scams
Craigslist is an online platform for classified advertisements. Its impact on local economy is non-negligible. For example, such advertisements reduce housing rental vacancy rates. The success of Craigslist is limited by persistent scams. The possibility of being scammed could prevent transactions from being completed. In economic terms, the expected value of loss due to a […]
The Recursive Loop-Free Alternative (RLFA) method
We present a method to find an alternate path, after a link failure, from a source node to a destination node. Since reconvergence of an Interior Gateway Protocol (IGP) (e.g., OSPF or IS-IS) can take hundreds of milliseconds, there is a need for a method that will find an alternate path in less time than […]
A mobile presence service is an essential component of a social network application
We describe previous researches on presence services, and survey the presence service of existing systems. Well known commercial IM systems leverage some form of centralized clusters to provide presence services. A taxonomy of different features and functions supported by the three most popular IM systems, AIM, Microsoft MSN and Yahoo! Messenger. The authors also provided […]
Random sampling by Proposing negative bootstrap
To automatically create a negative training set for a given concept, the mainstream methods randomly sample a relatively small subset from a large pool of (user-tagged) examples. The pool may consist of web images with free texts or consumer photos with user provided tags. Apart from the obvious fact that random sampling is simple and […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 14
- Next Page »