Date


People

Download Available

Dewey Decimal

684 results

For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems

Conference Proceeding
Pitt, J., & Hart, E. (2017)
For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W),. https://doi.org/10.1109/fas-w.2017.119
This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional ...

A new technique for designing 8 × 8 substitution box for image encryption applications

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017)
A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2017.8101591
To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secur...

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments

Journal Article
Al-Dubai, A. Y., Zomaya, A. Y., Alsarhan, A., Itradat, A., Al-Dubai, A., Zomaya, A., & Min, G. (2017)
Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578
In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We c...

Impact of selection methods on the diversity of many-objective Pareto set approximations

Journal Article
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2017)
Impact of selection methods on the diversity of many-objective Pareto set approximations. Procedia Computer Science, 112, (844-853). ISSN 1877-0509
Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultane...

ESBSC: Energy-Aware Service Brokering Strategy in Clouds

Conference Proceeding
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017)
ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...

Maximum Entropy in Nilsson's Probabilistic Logic

Conference Proceeding
Kane, T. B. (2017)
Maximum Entropy in Nilsson's Probabilistic Logic. In Proceedings of the 11th International Joint Conference on Artificial Intelligence (452-457
Nilsson's Probabilistic Logic is a set theoretic mechanism for reasoning with uncertainty. We propose a new way of looking at the probability constraints enforced by the frame...

A novel substitution box for encryption based on Lorenz equations

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017)
A novel substitution box for encryption based on Lorenz equations. In 2017 International Conference on Circuits, System and Simulation (ICCSS)https://doi.org/10.1109/cirsyssim.2017.8023176
Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms...

Simultaneous context inference and mapping using mm-Wave for indoor scenarios

Conference Proceeding
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017)
Simultaneous context inference and mapping using mm-Wave for indoor scenarios. In IEEE ICC 2017, (1-6). https://doi.org/10.1109/icc.2017.7996976
We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and milli...

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017)
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC). , (1-6). https://doi.org/10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...

Date


Date


Date


Date