Firewalls are critical in securing private networks of businesses, institutions, and home networks. A firewall is often placed at the entrance between a private network and the external network so that it can check each incoming or outgoing packet and decide whether to accept or discard the packet based on its policy. A firewall policy […]
Cryptographic Puzzle Hiding Scheme
Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. The open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. While eaves- dropping and message injection can be prevented using cryptographic […]
A Distributed Optimal Community-Aware Opportunistic Routing (Caor) Algorithm
Mobile social networks (MSNs) are a special kind of delay tolerant network (DTN), in which mobile users move around and communicate with each other via their carried short-distance wireless communication devices. Typical MSNs include pocket switch networks, mobile vehicular networks, mobile sensor networks. As more users exploit portable short-distance wireless communication devices (such as smart […]
A sufficient High obfuscation level
It is essential to detect inconsistencies or failures early. In manufacturing and logistic processes, items are tracked continuously to detect loss or to reroute them during transport. To answer this need complex event processing (CEP) systems have evolved as a key paradigm for business and industrial applications. CEP systems allow to detect situations by performing […]
The Prevalence Of Craigslist Based (Automobile) Scams
Craigslist is an online platform for classified advertisements. Its impact on local economy is non-negligible. For example, such advertisements reduce housing rental vacancy rates. The success of Craigslist is limited by persistent scams. The possibility of being scammed could prevent transactions from being completed. In economic terms, the expected value of loss due to a […]
The Recursive Loop-Free Alternative (RLFA) method
We present a method to find an alternate path, after a link failure, from a source node to a destination node. Since reconvergence of an Interior Gateway Protocol (IGP) (e.g., OSPF or IS-IS) can take hundreds of milliseconds, there is a need for a method that will find an alternate path in less time than […]
A mobile presence service is an essential component of a social network application
We describe previous researches on presence services, and survey the presence service of existing systems. Well known commercial IM systems leverage some form of centralized clusters to provide presence services. A taxonomy of different features and functions supported by the three most popular IM systems, AIM, Microsoft MSN and Yahoo! Messenger. The authors also provided […]
Random sampling by Proposing negative bootstrap
To automatically create a negative training set for a given concept, the mainstream methods randomly sample a relatively small subset from a large pool of (user-tagged) examples. The pool may consist of web images with free texts or consumer photos with user provided tags. Apart from the obvious fact that random sampling is simple and […]
Multiple Modalities For Improving Search Performance
We briefly group the related works for visual search reranking into two categories: recurrent pattern mining and multimodality fusion. The former assumes the existence of common patterns among relevant documents for reranking. The later predicts or learns the contribution of a modality in search reranking. The rapid development of Web 2.0 technologies has led to […]
Processing the prediction queue and sending PRED ACK or raw data
Cloud computing offers its customers an economical and convenient pay-as-you-go service model, known also as usage-based pricing . Cloud customers1 pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 7
- Next Page »