Sciweavers

ICOIN
2016
Springer
8 years 7 months ago
Vulnerability detection mechanism based on open API for multi-user's convenience
—Vulnerability Detection Tools (VDTs) have been researched and developed to prevent problems with respect to security. Such tools identify vulnerabilities that exist on the serve...
Sung Soo Kim, Daeun Lee, Choong Seon Hong
ICOIN
2016
Springer
8 years 7 months ago
On adaptive pre-fetching and caching the contents in content centric networking
Abstract—In the initial proposal of Content Centric Networking (CCN), routers store all passing contents (a content composed of several segments). So, in the best case, the route...
Kyi Thar, Saeed Ullah, Doo Ho Lee, Choong Seon Hon...
ICOIN
2016
Springer
8 years 7 months ago
An overlapping coalition formation approach to maximize payoffs in cloud computing environment
Abstract—Data-intensive applications are anticipated to increase day by day. The amount of computing and storage resources required by these are also increasing simultaneously, c...
Anupam Kumar Bairagi, Md. Golam Rabiul Alam, Ashis...
ICOIN
2016
Springer
8 years 7 months ago
Forwarding strategy on SDN-based content centric network for efficient content delivery
— Content Centric Networking (CCN) paradigm has been proposed to solve the problems of current Internet Protocol (IP) communication. However there is one significant drawback in ...
Jae Hyeok Son, DoHyeon Kim, Hyo Sung Kang, Choong ...
ICOIN
2016
Springer
8 years 7 months ago
Improving time slot acquisition through RSU's coordination for TDMA-based MAC protocol in VANETs
—Vehicles and Road Side Units (RSUs) are essential units to create a dynamic network, called Vehicular Ad hoc NETwork (VANETs). An RSU plays a role of collecting and analyzing tr...
Van Dung Nguyen, Oanh Tran Thi Kim, Nguyen Dang Tr...
ICOIN
2016
Springer
8 years 7 months ago
Efficient parallel multi-path interest forwarding for mobile user in CCN
— Internet traffic has been dramatically increasing due to development of IT technology and increase in the number of Internet service users. The existing TCP/IP network architec...
Doo Ho Lee, Kyi Thar, DoHyeon Kim, Choong Seon Hon...
ICOIN
2016
Springer
8 years 7 months ago
Multi-agent and reinforcement learning based code offloading in mobile fog
—Fog computing, which performs on network edges, is a front-end distributed computing archetype of centralized cloud computing. Mobile Fog is a special purpose computing prototyp...
Md. Golam Rabiul Alam, Yan Kyaw Tun, Choong Seon H...