Sciweavers

AINA
2010
IEEE
14 years 1 months ago
InnoDB Database Forensics
— Whenever data is being processed, there are many places where parts of the data are temporarily stored; thus forensic analysis can reveal past activities, create a (partial) ti...
Peter Fruhwirt, Marcus Huber, Martin Mulazzani, Ed...
AINA
2010
IEEE
14 years 1 months ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...
AINA
2010
IEEE
14 years 1 months ago
Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks
—This paper presents a middleware platform for the provision of services in disconnected MANETs, focusing on service invocation. This middleware exploits content-based communicat...
Yves Mahéo, Romeo Said
AINA
2010
IEEE
14 years 1 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
AINA
2010
IEEE
14 years 1 months ago
Context-Aware Mobile Services Transactions
— with the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable envir...
Muhammad Younas, Soraya Kouadri Mostéfaoui
AINA
2010
IEEE
14 years 1 months ago
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
— Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly incr...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca
AINA
2010
IEEE
14 years 1 months ago
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks
— Growing popularity of wireless ad hoc networks leads to higher demands on performance of all TCP/IP stack layers. Usually ad hoc networks operate according to IEEE 802.11 stand...
Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubr...
AINA
2010
IEEE
14 years 1 months ago
CAPTCHA Using Strangeness in Machine Translation
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
AINA
2010
IEEE
14 years 1 months ago
Iterative Route Discovery in AODV
Abstract—Several protocols for ad hoc network try to reduce redundancy as an effective measure against broadcast problems. Though these protocols ensure good performance in a fav...
Nashid Shahriar, Syed Ashker Ibne Mujib, Arup Rato...
AINA
2010
IEEE
14 years 1 months ago
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...