—A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updatingconfiguration parameters of, and distributing management…
Abstract—We propose employing receiver cooperation in centralizedtopology control to improve energy efficiency as well asnetwork connectivity. The idea of transmitter…
Abstract—Social networks have been recently employed as asource of information for event detection, with particular referenceto road traffic congestion and…
Real-Time Detection of Traffic FromTwitter Stream AnalysisAbstract—Social networks have been recently employed as asource of information for event detection, with…
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION ABSTRACT: In today’s era, there is a great deal added to…
Cloud storage such as Dropbox and Bitcasa is one of the most popular cloud services. Currently, with the prevalence of…
An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this prefetching technique,…
With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated…
Asthma is one of the most prevalent and costly chronic conditions in the United States which cannot be cured. However…
An initiative data prefetching scheme on the storage servers in distributed file systems for cloud computing. In this prefetching technique,…
It is long known attackers may use forged source IP address to conceal their real locations. To capture the spoofers,…
Abstract: Analyze the impact of network coding (NC) configuration on the performance of ad hoc networks with the consideration of…
MapReduce job, we consider to aggregate data with the same keys before sending them to remote reduce tasks. Although a…
Abstract—Intelligently extracting knowledge from social mediahas recently attracted great interest from the Biomedical andHealth Informatics community to simultaneously improve healthcareoutcomes…
In this paper, we present a distributed structured approach to Sybil attack. This is derived from the fact that our…