The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops
This article deals with the problem of automated selection of trees for felling in real time. The main parameters that influence the choice of wood for various methods of harvesting. The system of automated selection of trees under consideration is based on the method of laser scanning. Different ways of measuring the parameters of contactless also be considered. Developed a method of selection of...
The pervasiveness of connected embedded devices and Internet of Things (IoT) related application domains like smart cities, e-Health or, transportation lead to an constantly increasing amount of data, compute- and storage resources surrounding us. However, currently there is a gap between data acquisition and processing, usually bridged by gateway based approaches that integrate the devices and forward...
Interactive tabletops are the promising platforms to host Geographic Information System (GIS). Currently, user interfaces on tabletops do not suit GIS well enough for complex interaction. Thus it limits efficiency and collaboration. This paper analyses the design requirements from the perspective of the operational semantics, which refer to users' intention deduced from their operation sequence. We...
Intrusion detection is one of the primary applications in wireless sensor networks (WSNs) and has considerable importance in practice. Node deployment strategy plays a decisive role in determining the intrusion detection capability of a WSN. A uniform random deployment strategy fails to provide additional safety to sensitive areas within the network. However, a Gaussian deployment strategy provides...
Urban areas are often segmented into sub-regions for indepth analysis and complexity reduction. This paper tries to use vector based model to segment urban areas into regions by adopting a graph theory approach. Vector-based model uses geometric primitives such as points, lines and polygons to denote spatial objects on the Cartesian coordinate system. Generally, we mainly store and analyze the vector...
Support Vector Machines (SVMs) have been successfully applied to pattern recognition, regression, and classification. Because of their good performance and their mathematical foundations, SVMs are gaining popularity in solving various diagnosis problems. In this paper, we introduce a novel approach using a SVMs to solve the system-level fault diagnosis problem under the generalized comparison model...
In operations and management of large-scale cloud data enters, it is essential for administrators to handle failures occurring in their infrastructure before causing service-level violations. Some techniques for failure prediction have been studied because they can be used to start the troubleshooting process at the early stage of troubles and to prevent service-level violations from occurring. By...
Driven by an ever-increasing diversity of application contexts, execution environments and scalability requirements, modern software is faced with the challenge of frequent code refactoring. To address this, we have proposed an STL-like self-adaptive container library, which dynamically changes its data structures and resource usage to meet programmer-specified Service Level Objectives relating to...
The integrity checker validates the data structures in a target OS kernel from outside to enhance system security. Because of a huge number of kernel data structures, all possible invariants cannot be generated automatically, as we encounter a combinatorial explosion. In this paper, we propose a framework to generate a practical integrity checker automatically without examining all data structures...
Electrical power grids are in a phase of transition. Therefore, control mechanisms are needed that allow the integration of renewable energies, decentralized generation and storage systems, as well as electric vehicles into the arising smart grid. In this paper, we propose a privacy-aware architecture based on the principles of Organic Computing to tackle the aforementioned challenges. It enables...
Cyber-Individual (Cyber-I), is a counterpart of Real-Individual (Real-I) in cyberspace. It will gradually approximate to its Real-I and be able to provide better personalized digital services. The accuracy of this approximation is successively improved by continuously acquiring and utilizing personal data or information related to a person. However, the collection, processing, and access of sensitive...
Cloud computing is a service by which the clients can outsource their data to the cloud storage server to deal with the local storage limitation. However, the cloud storage providers are untrustworthy, which can lead to several security challenges, such as data availability, data integrity, and data confidentiality. To mitigate the issues of data availability and data integrity, a novel Slepian-Wolf-based...
Distributed routing algorithms that require only local information of a network attract much attention recently in order to realize fault-tolerant and low-overhead routing. Lack of global knowledge, however, often makes it difficult to promptly respond to traffic changes on paths out of the local scope. In order to overcome the difficulty, we need to accommodate distributed algorithms with exploration...
This paper explores the specific factors influencing the consumer trust in B2C e-commerce and proposes a three-dimensional trust model with the ability to provide dynamic support for trust establishment and management. The model summarizes the factors influencing the consumer trust in three aspects that are personal attitude, public opinion and third party. This paper also elaborates on the specific...
In recent years, Location-Based Services (LBSs) have been widely applied, and many websites provide LBSs which allow users to make trip planning with multiple activities on the Trip to meet their different demands (e.g., Distance, location, service, etc.). However in most studies, trip planning just focuses on finding the shortest trip that goes through many services during visiting many locations...
Security is an emerging topic in the field of embedded devices. ARM Trust Zone is a technology used to increase security of embedded systems using the ARM processor, the most common processor for embedded consumer devices. Trust zone is a hardware isolation mechanism that improves software security without the need for extra hardware chips. It separates critical applications from the normal (rich)...
In ad hoc networks utilizing wireless multi-hop communication functions, two or more nodes can communicate with each other through intermediate relaying nodes. However, ad hoc networks are susceptible to various attacks resulting from wireless multi-hop communication functions. To counter attacks, a secure dispersed data transfer method with a secret sharing scheme has been proposed. This method requires...
Although cloud computing is extremely active over the Internet in the real world, it presents many security challenges, such as access control and data integrity, which refer to the fact that while users can deploy their files into the cloud server, no one knows exactly where they should be. Thus, users' data may be threatened by internal or external attacks. Recently, some proposed schemes are aiming...
Recently, mobile nodes (shortly, nodes) used by users are capable of establishing concurrently cellular (3G/LTE) and WiFi connections have become popular. A mobile ad hoc network (MANET) consists of these nodes and they communicate with each other by multi-hop communication. In this paper, we propose a routing scheme based on the autonomous clustering and P2P overlay network to enhance the packet...
In mobile Internet, Location-Based Services (LBSs) as a popular kind of context-aware recommendation systems can recommend Point of Interest (POI) data according to current locations of users. However, the inherent feature leads to leak sensitive location information of users into untrusted LBS providers. This paper aims at the location privacy problem on query prediction which forecasts next locations...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.