![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Wide Area Networks
In this paper, an efficient time-based coordinated checkpointing protocol for mobile computing systems is proposed. The main difference from traditional time-based protocols is that our protocol tries to reduc...
-
Article
An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Mobile IP
Time-based coordinated checkpointing protocols are well suited for mobile computing systems because no explicit coordination message is needed while the advantages of coordinated checkpointing are kept. Howeve...
-
Chapter and Conference Paper
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense of those detectors. We call t...
-
Article
An End-to-End Logistics Management Application Over Heterogeneous Location Systems
RFID and GPS are the two technologies that receive significant attention in the field of indoor and outdoor location systems, respectively. In this research, the need of integrating multiple heterogeneous loca...
-
Chapter and Conference Paper
Enhancing Abnormal-Behavior-Based Stock Trend Prediction Algorithm with Cost-Sensitive Learning Using Genetic Algorithms
Stock market trend forecasting is an important and popular topic in academia or industry, and many studies have been proposed to handle this problem. Because stock market transactions are dynamic and nonlinear...