Trust modeling in social tagging of multimedia content

Tagging in online social networks is very popular these days, as it facilitates search and retrieval of multimedia content.
Continue Reading

Learn to Personalized Image Search from the Photo Sharing Websites.

Increasingly developed social sharing websites like Flickr and Youtube allow users to create, share, annotate, and comment medias.
Continue Reading

Client-side Load Balancer using Cloud

Web applications' traffic demand fluctuates widely and unpredictably. The common practice of provisioning a fixed capacity.
Continue Reading

Ensuring Data Storage Security in Cloud Computing

Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology.
Continue Reading

Agent-Based Urban Transportation Systems

Agent-based traffic management systems can use the autonomy, mobility, and adaptability of mobile agents to deal with dynamic traffic environments.
Continue Reading

Improving Utilization of Infrastructure Clouds

A key advantage of infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources.
Continue Reading

Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds

Infrastructure as a Service (IaaS) cloud computing has transform the way we think of acquiring resources by introducing a simple change.
Continue Reading

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

Cloud Computing has great potential of providing robust computational power to the society at reduced cost.
Continue Reading

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges.
We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key.
Continue Reading

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage

Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration
Continue Reading

Cloud Data Production for Masses

Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service
Continue Reading

Reliable Re-encryption in Unreliable Clouds

A key approach to secure cloud computing is for the data owner to store encrypted data in the cloud, and issue decryption keys to authorized users.
Continue Reading

Ensuring Distributed Accountability for Data Sharing in the Cloud

Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis.
Continue Reading

Costing of Cloud Computing Services A Total Cost of Ownership Approach

The use of Cloud Computing Services appears to offer significant cost advantages. Particularly start-up companies benefit from these advantages.
Continue Reading

Cloud Computing Security: From Single to Multi-Clouds

The use of cloud computing has increased rapidly in many organizations.
Continue Reading

Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs).
Continue Reading

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks

We Consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network.
Continue Reading

Bandwidth recycling in IEEE 802.16 Networks

IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS).
Continue Reading

Throughput Optimization in Mobile Backbone Networks.

This paper describes new algorithms for throughput optimization in a mobile backbone network.
Continue Reading

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks.

Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals.
Continue Reading

Fast Data Collection in Tree-Based Wireless Sensor Networks.

We first consider time scheduling on a single frequency channel with the aim of minimizing the number of time slots.
Continue Reading

The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems

Application-layer peer-to-peer (P2P) networks are considered to be the most important development for next-generation Internet infrastructure. For these systems to be effective, load balancing among the peers is critical.
Continue Reading

Efficient and Secured content processing using cooperative intermediaries

Content services such as content filtering and transcoding  adapt contents to meet system requirements, display capacities, or user preferences.
Continue Reading

Optimal state allocation for multicast communication with explicit forwarding

Scalable and adaptive multicast forwarding mechanism based on explicit multicast.
Continue Reading

Hybrid Scheduling of Dynamic Task Graphs with Selective Duplication for Multiprocessors under Memory and Time Constraints

Hybrid scheduling methodology for task graphs to multiprocessor embedded systems.
Continue Reading

Dectecting Malicious Packet Losses

We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets.
Continue Reading

Multi-path Dissemination in Regular Mesh Topologies

Mesh topologies are important for large-scale peer-to-peer systems that use low-power transceivers.
Continue Reading

Full-Information Lookups for Peer-to-Peer Overlays

Most peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes.
Continue Reading

Cooperative Caching in Wireless P2P Networks Design, Implementation, and Evaluation

Some recent studies have shown that cooperative cache can improve the system performance in wireless P2Pnetworks such as ad hoc networks and mesh networks.
Continue Reading

Correlation-Based Traffic Analysis Attacks on Anonymity Networks

We address attacks that exploit the timing behavior of TCP and other protocols and applications in low-latency anonymity networks.
Continue Reading

A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming

Peer-to-peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distribution.
Continue Reading

Layered Approach Using Conditional Random Fields for Intrusion Detection.

Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic.
Continue Reading

Analysis on Credit Card Fraud Detection Methods.

Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud.
Continue Reading

A Competitive Study of Cryptography Techniques over Block Cipher.

The complexity of cryptography does not allow many people to actually understand the motivations and therefore available for practicing security cryptography.
Continue Reading

Towards Situational Awareness of Large-Scale Botnet Probing Events.

Botnets dominate today's attack landscape. In this work, we investigate ways to analyze collections of malicious probing.
Continue Reading

Online Intrusion Alert Aggregation with Generative Data Stream Modeling.

Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts-produces by low-level intrusion detection systems, firewalls, etc.
Continue Reading

RITAS: Services for Randomized Intrusion Tolerance

Randomized agreement protocols have been around for more than two decades.
Continue Reading

Modeling and Detection of Camouflaging Worm.

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet.
Continue Reading

Nymble Blocking Misbehaving Users in Anonymizing Networks.

Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server.
Continue Reading

SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.

Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays.
Continue Reading

Ensuring Distributed Accountability for Data Sharing in the Cloud

Cloud computing enables highly scalable services to be easily consumed over the internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate.
Continue Reading

DoubleGuard: Detecting Intrusions In Multi-tier Web Applications

Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere.
Continue Reading

Online Modeling of Proactive Moderation System for Auction Fraud Detection

We consider the problem of building online machine-learned models for detecting auction frauds in e-commence web sites.
Continue Reading

Packet-Hiding Methods for Preventing Selective Jamming Attacks.

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
Continue Reading

Risk-Aware Mitigation for MANET Routing Attacks.

Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure.
Continue Reading

Effective Navigation of Query Results Based on Concept Hierarchies.

Search queries on biomedical databases, such as PubMed, often return a large number of results, only a small subset of which is relevant to the user.
Continue Reading

Ranking Spatial Data by Quality Preferences

A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood.
Continue Reading

The CoQUOS Approach to Continuous Queries in Unstructured Overlays

The current peer-to-peer (P2P) content distribution systems are constricted by their simple on-demand content discovery mechanism.
Continue Reading

Extended XML Tree Pattern Matching: Theories and Algorithms

As business and enterprises generate and exchange XML data more often, there is an increasing need for efficient processing of queries on XML data.
Continue Reading

Organizing User Search Histories

Users are increasingly pursuing complex task-oriented goals on the web, such as making travel arrangements, managing finances, or planning purchases.
Continue Reading

Multiparty Access Control for Online Social Networks Model and Mechanisms

Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of internet users.
Continue Reading

Ranking Model Adaptation for Domain-Specific Search.

With the explosive emergence of vertical search domains, applying the broad-based ranking model directly to different domains is no longer desirable.
Continue Reading

Efficient Extended Boolean Retrieval.

Extended Boolean retrieval (EBR) models were proposed nearly three decades ago, but have had little practical impact, despite their significant advantages compared to either ranked keyword or pure Boolean retrieval.
Continue Reading

Slicing A New Approach to Privacy Preserving Data Publishing.

Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing.
Continue Reading

Mesh Based Multicast Routing in MANET Stable Link Based Approach

The group-oriented services are one of the primary application classes that are addressed by mobile ad hoc networks (MANETs) in recent years.
Continue Reading

Host-to-Host Congestion Control for TCP

The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Continue Reading

Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks

Multicast traffic over the Internet is growing steadily with increasing number of demanding applications including Internet broadcasting, video conferences, data stream applications and web-content distributions.
Continue Reading

PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems.

A declarative SQL-like language and a middleware infrastructure are presented for collecting data from different nodes of a pervasive system.
Continue Reading

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

A distributed adaptive opportunistic routing scheme for multihop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model.
Continue Reading

Cut Detection in Wireless Sensor Networks

A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a cut. We consider the problem of detecting cuts by the remaining nodes of a wireless sensor network.
Continue Reading

Always Acyclic Distributed Path Computation.

Distributed routing algorithms may give rise to transient loops during path recomputation, which can pose significant stability problems in high-speed networks. Distributed Path Computation with Intermediate Variables (DIV)
Continue Reading

Distributed Explicit Rate Schemes in Multi-Input-Multi-Output Network

With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for multi-input-multi-output service.
Continue Reading

Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems.

Reservation-based (as opposed to contention-based) channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-time applications.
Continue Reading

Channel Allocation in Wireless Data Center Networks.

Unbalanced traffic demands of different data center applications are an important issue in designing Data center network (DCNs).
Continue Reading

Buffer sizing for 802.11 Based Networks.

We consider the sizing of network buffers in IEEE 802.11-based networks. Wireless networks face a number of fundamental issues that do not arise in wired networks.
Continue Reading

Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks.

We analyze the delay performance of a multi-hop wireless network in which the routes between source-destination pairs are fixed.
Continue Reading

ProgME: Towards Programmable Network Measurement.

Traffic measurement provide critical input for a wide range of network management applications, including traffic engineering, accounting, and security analysis. Requirements and/or traffic conditions.
Continue Reading

SPAF: Stateless FSA-based Packet Filters.

Stateless packet filtering technique based on finite-state automata (FSA). FSAs provide a comprehensive framework with well-defined compostion operations that enable the generation of stateless filters from high-level specifications.
Continue Reading

Selfish Overlay Network Creation and Maintenance.

A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of the network formation, i.e., folding new arrivals into an existing overlay, and rewiring to cope with changing network conditions.
Continue Reading

Security Architecture for Cloud Networking

Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS).
Continue Reading

Packet Loss Control Using Tokens at the Network Edge

A series of protocols have been introduced to supplement the insufficient TCP mechanism controlling the network congestion.
Continue Reading

An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System

Peer-to-peer overlay networks are widely used in distributed systems. P2P networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary.

Continue Reading

Game-Theoretic Pricing for Video Streaming in Mobile Networks

Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers.
Continue Reading

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings.
Continue Reading

Privacy- and Integrity-Preserving Range Queries in Sensor Networks

The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries.
Continue Reading