|
ROLE
BOOKMARK & SHARE
|
|
Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
December 2015
Journal of Network and Computer Applications: Volume 58 Issue C, December 2015
Publisher: Academic Press Ltd.
Content-Centric Networking (CCN), which changes from host-centric communication model to content-centric communication model, has recently attracted a lot of attention from researchers. As recently emerged a clean slate approach of the future Internet, CCN needs to be further supplemented yet. Since power consumption by Internet and user demand for Quality ...
Keywords:
Ant colony optimization, Energy-efficiency, Named data networking, Quality of service, Content-Centric Networking
2
June 2015
ACM Transactions on the Web (TWEB): Volume 9 Issue 3, June 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5, Downloads (12 Months): 40, Downloads (Overall): 173
Full text available:
PDF
Distributed service networks are popular platforms for service providers to offer services to consumers and for service consumers to acquire services from unknown parties. eBay and Amazon are two well-known examples of enabling and hosting such service networks to connect service providers to service consumers. Trust management is a critical ...
Keywords:
Feedback rating quality, Trust, reliability, attack resilience, distributed service network
3
May 2015
WWW '15 Companion: Proceedings of the 24th International Conference on World Wide Web
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 9, Downloads (12 Months): 56, Downloads (Overall): 148
Full text available:
PDF
A central task of computational linguistics is to decide if two pieces of texts have similar meanings. Ideally, this depends on an intuitive notion of semantic distance. While this semantic distance is most likely undefinable and uncomputable, in practice it is approximated heuristically, consciously or unconsciously. In this paper, we ...
Keywords:
semantic distance, information distance, text classification, question answering
4
April 2015
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4, Downloads (12 Months): 46, Downloads (Overall): 154
Full text available:
PDF
Physical layer message integrity protection and authentication by countering signal-cancellation has been shown as a promising alternative to traditional pure cryptographic message authentication protocols, due to the non-necessity of neither pre-shared secrets nor secure channels. However, the security of such an approach remained an open problem due to the lack ...
5
February 2015
ACM SIGSOFT Software Engineering Notes: Volume 40 Issue 1, January 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 16, Downloads (Overall): 87
Full text available:
PDF
The second International Workshop on Software Mining (Soft-mine) was held on the 11th of November 2013. The workshop was held in conjunction with the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE) in Silicon Valley, California, USA. The workshop has facilitated researchers who are interested in mining various types ...
Keywords:
developer productivity, Software quality, data mining, workshop report
6
June 2014
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 6, Downloads (12 Months): 63, Downloads (Overall): 392
Full text available:
PDF
Cloud computing promises users massive scale outsourced data storage services with much lower costs than traditional methods. However, privacy concerns compel sensitive data to be stored on the cloud server in an encrypted form. This posts a great challenge for effectively utilizing cloud data, such as executing common SQL queries. ...
Keywords:
multiple dimension, tree structures, range search, encrypted cloud data
7
March 2014
Microelectronic Engineering: Volume 116, March, 2014
Publisher: Elsevier Science Ltd.
The filling mechanism of a special through silicon vias (TSV) structure is investigated by electrochemical test and simulation technique compared with the conventional TSV structure in this paper. The effects of additives in methanesulfonic solution are briefly studied by cyclic voltammetry to obtain the suitable copper plating condition for conventional ...
Keywords:
Through-silicon-via, Electroplating, Simulation, Methanesulfonic acid
8
September 2013
BodyNets '13: Proceedings of the 8th International Conference on Body Area Networks
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 9, Downloads (Overall): 53
Full text available:
PDF
Streaming and analysis of time series body sensor data have been well investigated recently for various applications, especially on health data monitoring. However, existing strategies work independently from each other. Obviously, lacking appropriate information sharing, feedback, and interaction mechanisms, these strategies, even in combination, do not provide an efficient and ...
Keywords:
streaming, body sensor networks, data analysis, framework, time series data
9
July 2013
Communications of the ACM: Volume 56 Issue 7, July 2013
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 41, Downloads (Overall): 831
The RSVP voice-recognition search engine improves speech recognition and translation accuracy in question answering.
10
May 2013
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 14, Downloads (12 Months): 156, Downloads (Overall): 1,092
Full text available:
PDF
With the increasing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet practically-efficient secure search functions over encrypted data a challenging problem. In this paper, we ...
Keywords:
privacy-preserving search, multi-keyword search, similarity-based ranking, cloud computing
11
April 2013
CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 6, Downloads (12 Months): 54, Downloads (Overall): 658
Full text available:
PDF
This paper describes the Dubuque Electricity Portal, a city-scale system aimed at supporting voluntary reductions of electricity consumption. The Portal provided each household with fine-grained feedback on its electricity use, as well as using incentives, comparisons, and goal setting to encourage conservation. Logs, a survey and interviews were used to ...
Keywords:
behavior change, ecf, sustainability, consumption feedback systems, social comparison, electricity, smart meters
12
April 2013
WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 5, Downloads (12 Months): 40, Downloads (Overall): 431
Full text available:
PDF
Recently there has been an increasing interest on bootstrapping security for wireless networks merely using physical layer characteristics. In particular, the focus has been on two fundamental security issues - device authentication and secret key extraction. While most existing works emphasize on tackling the two issues separately, it remains an ...
Keywords:
physical layer, rss, sensor, authenticated key generation, wireless body area network
13
April 2013
ACM Transactions on Sensor Networks (TOSN): Volume 9 Issue 2, March 2013
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 4, Downloads (12 Months): 87, Downloads (Overall): 909
Full text available:
PDF
The body area network (BAN) is a key enabling technology in e-healthcare. An important security issue is to establish initial trust relationships among the BAN devices before they are actually deployed and generate necessary shared secret keys to protect the subsequent wireless communications. Due to the ad hoc nature of ...
Keywords:
key management, device pairing, body area networks, efficiency, Trust establishment, usable security
14
October 2012
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 25, Downloads (Overall): 331
Full text available:
PDF
Simultaneously realizing device authentication and fast secret key extraction is a challenging issue in wireless networks. Most existing works solve this problem by utilizing either advanced hardware or out-of-band channel, which is not always available for commercial-off-the-shelf wireless devices. In this work, we solve this challenging issue under the setting ...
Keywords:
ban, sensor, authenticated key generation, physical layer
15
September 2012
WABI'12: Proceedings of the 12th international conference on Algorithms in Bioinformatics
Publisher: Springer-Verlag
Previous study shows that the same type of bond lengths and angles fit Gaussian distributions well with small standard deviations on high resolution protein structure data. The mean values of these Gaussian distributions have been widely used as ideal bond lengths and angles in bioinformatics. However, we are not aware ...
16
July 2012
Journal of Network and Computer Applications: Volume 35 Issue 4, July, 2012
Publisher: Academic Press Ltd.
Human associated delay-tolerant network (HDTN) is a new delay-tolerant network where mobile devices are associated with humans. It can be viewed from both their geographic and social dimensions. The combination of these different dimensions can enable us to more accurately comprehend a delay-tolerant network and consequently use this multi-dimensional information ...
Keywords:
Multiple dimensions, Social aware routing, Delay-tolerant network, Multi-cast
17
June 2012
Automated Software Engineering: Volume 19 Issue 2, June 2012
Publisher: Kluwer Academic Publishers
Software defect prediction can help us better understand and control software quality. Current defect prediction techniques are mainly based on a sufficient amount of historical project data. However, historical data is often not available for new projects and for many organizations. In this case, effective defect prediction is difficult to ...
Keywords:
Machine learning, Sampling, Active semi-supervised learning, Software defect prediction, Quality assurance
18
May 2012
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB): Volume 9 Issue 3, May 2012
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1, Downloads (12 Months): 1, Downloads (Overall): 108
Full text available:
PDF
Ab initio protein structure prediction methods first generate large sets of structural conformations as candidates (called decoys), and then select the most representative decoys through clustering techniques. Classical clustering methods are inefficient due to the pairwise distance calculation, and thus become infeasible when the number of decoys is large. In ...
Keywords:
Protein structure, decoy selection, clustering.
19
May 2012
Journal of Network and Computer Applications: Volume 35 Issue 3, May, 2012
Publisher: Academic Press Ltd.
Along with the development of the service-oriented architecture (SOA) and cloud computing, a large number of service providers have created an intense competitive world of business. Consequently, it is becoming increasingly complex to select a service provider for a user as a result of their various economic and social attributes. ...
Keywords:
Service-oriented architecture, Quality of service, Scheduling, Web service
20
April 2012
WISEC '12: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 2, Downloads (12 Months): 10, Downloads (Overall): 380
Full text available:
PDF
Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. In order to ensure the trustworthy and reliable gathering of patient's critical health information, it is essential to provide node authentication service in a BAN, which prevents an attacker from impersonation ...
Keywords:
wireless body area network, physical layer, authentication, rss, sensor
|
|