咨询与建议

限定检索结果

文献类型

  • 35 篇 会议
  • 12 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 49 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 18 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 2 篇 电气工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 信息与通信工程
    • 1 篇 水利工程
    • 1 篇 网络空间安全
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 6 篇 cloud computing
  • 5 篇 data models
  • 3 篇 servers
  • 3 篇 wireless sensor ...
  • 3 篇 computational mo...
  • 3 篇 protocols
  • 2 篇 fuzzy logic
  • 2 篇 information syst...
  • 2 篇 theory of comput...
  • 2 篇 operating system...
  • 2 篇 task analysis
  • 2 篇 filtering
  • 2 篇 software enginee...
  • 2 篇 electronic mail
  • 2 篇 computer communi...
  • 2 篇 wireless communi...
  • 2 篇 body area networ...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 e-commerce

机构

  • 4 篇 xiangjiang lab
  • 3 篇 parallel and dis...
  • 3 篇 key lab. of para...
  • 3 篇 key lab. of para...
  • 2 篇 university of ai...
  • 2 篇 national key lab...
  • 2 篇 key lab. of para...
  • 2 篇 key lab. of para...
  • 2 篇 parallel and dis...
  • 2 篇 national laborat...
  • 2 篇 computing platfo...
  • 2 篇 science and tech...
  • 2 篇 intelligent game...
  • 2 篇 shanghai key lab...
  • 2 篇 parallel and dis...
  • 2 篇 dept. of cs geor...
  • 2 篇 shandong univers...
  • 2 篇 college of compu...
  • 2 篇 research center ...
  • 2 篇 parallel and dis...

作者

  • 8 篇 jemal abawajy
  • 7 篇 wang tao
  • 7 篇 wang huaimin
  • 5 篇 huaimin wang
  • 5 篇 jemal h. abawajy
  • 5 篇 yin gang
  • 4 篇 masitah ahmad
  • 3 篇 isredza rahmi a....
  • 3 篇 yang cheng
  • 3 篇 davood izadi
  • 3 篇 sara ghanavati
  • 2 篇 jianhua sun
  • 2 篇 guodong yi
  • 2 篇 peichang shi
  • 2 篇 liming fang
  • 2 篇 haibo mi
  • 2 篇 soon-keow chong
  • 2 篇 zhe liu
  • 2 篇 yi pan
  • 2 篇 shi peichang

语言

  • 49 篇 英文
检索条件"机构=Parallel and Distributed Computing Lab"
49 条 记 录,以下是11-20 订阅
排序:
Analysis of Insiders Attack Mitigation Strategies
收藏 引用
Procedia - Social and Behavioral Sciences 2014年 129卷 611-618页
作者: Zulkefli Mohd Yusop Jemal H. Abawajy Parallel and Distributed Computing Lab School of Information Technology Deakin University Victoria Australia
Insider threat has become a serious information security issues within organizations. In this paper, we analyze the problem of insider threats with emphases on the Cloud computing platform. Security is one of the majo... 详细信息
来源: 评论
Profiling Phishing Email Based on Clustering Approach
Profiling Phishing Email Based on Clustering Approach
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Isredza Rahmi A. Hamid Jemal H. Abawajy Parallel and Distributed Computing Lab Deakin University Victoria Australia
In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generati... 详细信息
来源: 评论
A Multilevel Trust Management Framework for Service Oriented Environment
收藏 引用
Procedia - Social and Behavioral Sciences 2014年 129卷 396-405页
作者: Soon-Keow Chong Jemal Abawajy Isredza Rahmi A. Hamid Masitah Ahmad Parallel and Distributed Computing Lab School of Information Technology Deakin University Victoria 3217 Australia
In service-oriented computing applications, trust management systems are emerging as a promising technology to improve the e-commerce consumers and provider's relationship. Both consumers and providers need to eva... 详细信息
来源: 评论
Service Level Agreements for the Digital Library
收藏 引用
Procedia - Social and Behavioral Sciences 2014年 147卷 237-243页
作者: Masitah Ahmad Jemal H. Abawajy Parallel and Distributed Computing Lab Scholl of Information Technology Deakin University 3216 Victoria Australia
Digital libraries offer a massive set of digital services to geographically distributed library patrons. The digital services are commonly sourced from third-party service providers for charge. As externally sourced d... 详细信息
来源: 评论
Enhancing Trust Management in Cloud Environment
收藏 引用
Procedia - Social and Behavioral Sciences 2014年 129卷 314-321页
作者: Soon-Keow Chong Jemal Abawajy Masitah Ahmad Isredza Rahmi A. Hamid Parallel and Distributed Computing Lab School of Information Technology Deakin University Victoria 3217 Australia
Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between e-commerce trading partners in cloud environment. In this highly competitive and distrib... 详细信息
来源: 评论
DMSA: Decentralized and Multi-keyword Selective Data Sharing and Acquisition  22
DMSA: Decentralized and Multi-keyword Selective Data Sharing...
收藏 引用
22nd IEEE International Symposium on parallel and distributed Processing with Applications, ISPA 2024
作者: Lin, Moheng Shi, Peichang Fu, Xiang Jiang, Feng Yi, Guodong National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Changsha410073 China Xiangjiang Lab Changsha410073 China
Blockchain technology has been extensively uti-lized in decentralized data-sharing applications, with the immutability of blockchain providing a witness for the circulation of data. However, current blockchain data-sh... 详细信息
来源: 评论
Digital Library Service Quality Assessment Model
收藏 引用
Procedia - Social and Behavioral Sciences 2014年 129卷 571-580页
作者: Masitah Ahmad Jemal H. Abawajy Parallel and Distributed Computing Lab School of Information Technology 3216 Deakin University Victoria Australia
With the introduction of digital library services, the quality of service (QoS) has become paramount importance for evaluating the performance of the digital library service provisioning. Various models and frameworks... 详细信息
来源: 评论
Preserving Utility in Social Network Graph Anonymization
Preserving Utility in Social Network Graph Anonymization
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Mohd Izuan Hafez Ninggal Jemal H. Abawajy Parallel and Distributed Computing Lab Deakin University Victoria Australia
To protect from privacy disclosure, the social network graph is modified in order to hide the information that potentially be used to disclose person's identity. However, when the social network graph is changed, ... 详细信息
来源: 评论
Linking stack overflow to issue tracker for issue resolution  2014
Linking stack overflow to issue tracker for issue resolution
收藏 引用
6th Asia-Pacific Symposium on Internetware, Internetware 2014
作者: Wang, Tao Yin, Gang Wang, Huaimin Yang, Cheng Zou, Peng Key Lab. of Parallel and Distributed Computing Colledge of Computer National University of Defence Technology ChangSha Hunan China Academy of Equipment Command and Technology Beijing100000 China
Issue resolution is a central task for software development. The efficiency of issue fixing largely relies on the issue report quality. Stack Overflow, which hosts rich and real-Time posts about programming-specific p... 详细信息
来源: 评论
Next Generation Cloud computing Reliability:Issues and Challenges
Next Generation Cloud Computing Reliability:Issues and Chall...
收藏 引用
The 7th International Symposium on parallel Architectures, Algorithms and Programming, PAAP2015(2015年第七届国际并行体系结构,算法和编程研讨会)
作者: Jemal Abawajy Parallel and Distributed Computing Lab School of Information Technology Deakin University Australia
Introduction Cloud computing is widely recognized for its cost savings,scaling and for accelerating business innovation.
来源: 评论