The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The highly imbalanced nature of software fault datasets results in poor performance of machine leaning techniques used for software fault prediction. The objective of this paper is to evaluate sampling techniques and Meta-Cost learning in software fault prediction to alleviate problem of imbalanced data. We evaluate four sampling techniques in metrics as well as code smells based fault prediction...
Outlier detection has been used to detect the outlier and, where appropriate, eliminate outliers from various types of data. It has vital applications in the field of fraud detection, network robustness analysis, Insider Trading Detection, email spam detection, Medical and Public Health Outlier Detection, Industrial Damage Detection, Image processing fraud detection, marketing, network sensors and...
Mobile opportunistic networks allow nodes to freely join and leave the network; hence they are highly susceptible to security threats. The paper proposes a method for detection and avoidance of a non-simultaneous Sybil attack in mobile opportunistic networks. In this attack, a malicious node assumes multiple, fake identities (i.e. Sybils) over a period of time to remain active in the network even...
The paper proposes two distributed algorithms for the construction of a connected dominating set (CDS) in a mobile ad hoc network. The CDS can be used as a virtual backbone for efficient communication in the ad hoc networks and consequently allow scalability of distributed algorithms implemented for these networks. The proposed algorithms organize the entire network topology into clusters and the...
The widespread availability and increasing processing power of mobile devices has lead to a focus towards the development of autonomous mobile computing grids (MoGs). Such mobile grids allow the successful execution of distributed applications; without access to any static nodes or wired networks. However, the implementation of a fault tolerance technique is essential to completely utilize the mobile...
Mobile Grids (MoGs) are an emerging sphere in distributed computing and are expected to become a crucial part of computational Grids in future. Apart from allowing a convenient user access to the Grid, mobile hosts can act as valuable computing resources in the Grid. However, mobile hosts have limitations of resources such as stable storage, wireless bandwidth, battery power etc. and are also subject...
Mobile Ad hoc networks (MANETs) have significantly enhanced the wireless networks as they eliminate the need for fixed infrastructure and are easily deployable. Apart from their application for communication purposes, these are increasingly being used for expanding the computing capabilities of existing cellular mobile systems and for the implementation of mobile computing grids. Therefore, a fault...
A global checkpoint of a distributed computation is formed by a set of local checkpoints, one from each process in the system. However, a local checkpoint taken by a process may be useless if it cannot be part of any consistent global checkpoint. Since checkpointing is expensive in MANETs due to the limitation of available resources, such useless checkpoints need to be prevented for an efficient checkpointing...
The nodes in mobile ad hoc networks (MANETs) are susceptible to various types of failures and therefore the protocols designed for these networks are required to be fault tolerant. Checkpointing and rollback recovery is a well explored fault tolerance technique for the static and cellular mobile distributed systems. However, it is not trivially applicable to MANETs due to their dynamic topology and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.