The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, we develop a thermal-aware job scheduling strategy called tDispatch tailored for MapReduce applications running on Hadoop clusters. The scheduling idea of tDispatch is motivated by a profiling study of CPU-intensive and I/O-intensive jobs from the perspective of thermal efficiency. More specifically, we investigate the thermal behaviors of these two types of jobs running on a Hadoop...
The Internet of Things or ‘IoT’ described as a highly interconnected network of heterogeneous devices where all kinds of communications with any type of devices seem to be possible, preserving the location privacy of sensors always been a concern specifically in critical and strategic areas, Analyzing the traffic of the packets allow the eavesdropper to derive the location of sensitive, important...
We propose a Cloud Advisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking into account evidence support and to measure transparency based on the Cloud Controls Matrix (CCM) framework. The selection process is based on a set of assurance requirements that...
In spite of the benefits that could flow from its adoption, cloud computing brings new challenges associated with potential lack of transparency, trust, and loss of controls. With a growing number of cloud service providers, potential customers will require methods for selecting trustworthy and appropriate providers. We discuss existing tools, methods and frameworks that promote the adoption of cloud...
Banking industry suffers lost in millions of dollars each year caused by credit card fraud. Tremendous effort, time and money have been spent to detect fraud where there are studies done on creating personalized model for each credit card holder to identify fraud. These studies claimed that each card holder carries different spending behavior which necessitates personalized model. However, to the...
Although the invention of Voice over Internet Protocol (VoIP) in communication technology created significant attractive services for its users, it also brings new security threats. Criminals exploit these security threats to perform illegal activities such as VoIP malicious attacks, this will require digital forensic investigators to detect and provide digital evidence. Finding digital evidence in...
In this paper, we propose a technique for the automatic extraction of moving objects from compressed domain video. We propose the use of a spatio-temporal filter for filtering the motion vectors and a hybrid approach to exploit both compressed domain processing and spatial domain processing to meet the tradeoff between computation and accuracy. The experimental results shows that our approach can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.