—Resource provisioning for N-tier web applications in Clouds is non-trivial due to at least two reasons. First, there is an inherent optimization conflict between cost of resour...
PengCheng Xiong, Zhikui Wang, Simon Malkowski, Qin...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
A temporally scalable video coding algorithm allows extraction of video of multiple frame rates from a single coded stream. This paper compares the rate-distortion performance of ...
Associative classification (AC) has been studied in the areas of content-based multimedia retrieval and semantic concept detection due to its high accuracy. The traditional AC alg...
Lin Lin, Mei-Ling Shyu, Guy Ravitz, Shu-Ching Chen
— We propose an efficient client-based approach for channel management (channel assignment and load balancing) in 802.11-based WLANs that lead to better usage of the wireless sp...
Arunesh Mishra, Vladimir Brik, Suman Banerjee, Ara...