Location-based mobile gaming combines gameplay with physical activity. We have developed a game, OMopsi, based on the concept of orienteering, which can be played on mobile phones with GPS receiver and internet connec...
详细信息
Since the Web 2.0 era, the internet is a huge content editing place in which users contribute to the content they browse. Users do not just edit the content but they collaborate on this content. Such shared content ca...
详细信息
the scope of this paper is two-fold: firstly it proposes the application of a 1-2-3 Zones approach to internet of things (IoT)-related Digital Forensics (DF) investigations. Secondly, it introduces a Next-Best-thing T...
详细信息
the inherent structure of the power grid deeply influences its secure functioning and stability. As power grids move towards becoming 9;smarter9; with increased demand response and decentralized control, the top...
详细信息
ISBN:
(纸本)9781479932115
the inherent structure of the power grid deeply influences its secure functioning and stability. As power grids move towards becoming 'smarter' with increased demand response and decentralized control, the topological aspects of the grid have become even more important. Understanding the topology can thus lead to better strategies to control the smart grid as well as enable rapid identification and prevention of risks such as blackouts. this paper focuses on modeling and analyzing basic similarities in network structure of large power grids across America and Europe. A simple but accurate model of the power grid can help generate real-sized test cases to evaluate new grid technologies as well as aid in tractable theoretical analysis of the grid structure.
In this paper, we propose a new protocol of privacy preserving frequency computation in 2-part fully distributed data (2PFD). this protocol are practical than of previous protocol. More specifically, we achieve a prot...
详细信息
the Collaborative Symbiotic Weather Forecasting (CSWF) system lets a user compute a short time, high-resolution forecast for a small region around the user, in a few minutes, on-demand, on a PC. A collaborated forecas...
详细信息
this paper focuses on a healthcare solution capable of converting echocardiography videos into text, and vice versa, for transmission between urban and rural areas. People living in rural areas often encounter restric...
详细信息
Migration of virtual machines is an important feature for the management of a virtualized environment. Current strategies for managing migration consider more of resource scheduling and system maintenance, ignoring po...
详细信息
ISBN:
(纸本)9783901882531
Migration of virtual machines is an important feature for the management of a virtualized environment. Current strategies for managing migration consider more of resource scheduling and system maintenance, ignoring possible constraints on migration from virtual machines and applications. this paper introduces a migration locking mechanism and its implementation on Xen. the virtual machine migration locking mechanism provides a standard interface for virtual machine users to control migration status of their virtual machines according to their own wishes, such as security, hardware or performance demands and so on. But forced migration locking by the end users or applications could conflict withthe management decisions by managers or the virtual machine monitors. How to coordinate different requirements between virtual machine users and managers needs further discussion.
computing, communication and entertainment media have rapidly converged creating a wide range of smart devices, driven by the internet and the need and desire to be always connected. New device categories are emerging...
详细信息
Applications of private matching (PM) are not limited to any specific domain of interest. Social media, e-health and commerce applications can afford to share certain common information without disclosing any extra de...
详细信息
ISBN:
(纸本)9781479932115
Applications of private matching (PM) are not limited to any specific domain of interest. Social media, e-health and commerce applications can afford to share certain common information without disclosing any extra details. PM ensures to reveal only common information between the communicating parties. In this paper we have presented a light weight protocol named Reflection for PM. Depending upon different requirements of involving parties, Reflection can be used in presence of third party or as a point to point communication. Using services of third party (cloud) where communication has to route through it, it still preserves the privacy aspect of values being matched. the protocol works on a random number and produces the result of matching on behalf of original values, hence it converges in only two pass communication. It also protects any additional slipway of information during or after the PM. It safeguards the user communication against eavesdropper and even from offline attacks. In its simpler version, the protocol can work without using any encryption. Value comparison mechanism in presence of encryption, makes the overall process of PM more secure against hostile users.
暂无评论