Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    A Research Agenda Towards Culturally Aware Information Systems

    Our world is not homogeneous in nature, it has multiple languages, ethnic groups, culture, beliefs, and varying perceptions of things. There is development towards catering experiences based on these varying d...

    Abhisek Sharma, Sarika Jain in Advances in IoT and Security with Computat… (2023)

  2. Article

    1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS)

    Pradeep Kumar Singh, Bharat Bhargava, Wei-Chiang Hong in Multimedia Tools and Applications (2022)

  3. No Access

    Article

    Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment

    Under big data environment, machine learning has been rapidly developed and widely used. It has been successfully applied in computer vision, natural language processing, computer security and other applicatio...

    Chen Hongsong, Zhang Yongpeng, Cao Yongrui in Wireless Personal Communications (2021)

  4. No Access

    Article

    MioStream: a peer-to-peer distributed live media streaming on the edge

    The typical centralized cloud model is poorly suited to latency-sensitive applications requiring low-latency and high-throughput. This paper proposes an integrity-preserving serverless framework for live-video...

    Servio Palacios, Victor Santos, Edgardo Barsallo in Multimedia Tools and Applications (2019)

  5. No Access

    Book and Conference Proceedings

    Futuristic Trends in Network and Communication Technologies

    First International Conference, FTNCT 2018, Solan, India, February 9–10, 2018, Revised Selected Papers

    Dr. Pradeep Kumar Singh in Communications in Computer and Information Science (2019)

  6. No Access

    Chapter and Conference Paper

    WIP - SKOD: A Framework for Situational Knowledge on Demand

    Extracting relevant patterns from heterogeneous data streams poses significant computational and analytical challenges. Further, identifying such patterns and pushing analogous content to interested parties ac...

    Servio Palacios, K. M. A. Solaiman in Heterogeneous Data Management, Polystores,… (2019)

  7. Article

    Correction to: Catalytic Decomposition of Hydrogen-Iodide Over Nanocrystalline Ceria Promoted by Transition Metal Oxides for Hydrogen Production in Sulfur–Iodine Thermo-Chemical Cycle

    In the original version of this article, four co-authors and some texts of acknowledgement were missing.

    Amit Singhania, Ashok N. Bhaskarwar, Parvatalu Damaraju in Catalysis Letters (2018)

  8. No Access

    Reference Work Entry In depth

    Flex Transactions

    Aidong Zhang, Bharat Bhargava in Encyclopedia of Database Systems (2018)

  9. No Access

    Chapter and Conference Paper

    Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud

    In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insid...

    Denis Ulybyshev, Bharat Bhargava in Applications of Computing and Communicatio… (2018)

  10. No Access

    Living Reference Work Entry In depth

    Flex Transactions

    Aidong Zhang, Bharat Bhargava in Encyclopedia of Database Systems

  11. No Access

    Article

    A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks

    Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing ...

    Hyo** Kim, Ruy de Oliveira, Bharat Bhargava in Wireless Personal Communications (2013)

  12. Article

    Editorial for Special Issue on “New Technologies and Applications for Wireless Communications & Mobile Cloud Computing”

    Taeshik Shon, Athanasios V. Vasilakos, Bharat Bhargava in Mobile Networks and Applications (2013)

  13. No Access

    Article

    A Survey of Computation Offloading for Mobile Systems

    Mobile systems have limited resources, such as battery life, network bandwidth, storage capacity, and processor performance. These restrictions may be alleviated by computation offloading: sending heavy computati...

    Karthik Kumar, Jibang Liu, Yung-Hsiang Lu in Mobile Networks and Applications (2013)

  14. No Access

    Chapter and Conference Paper

    Protecting PLM Data Throughout Their Lifecycle

    Enterprises operate in a global economy with their operations dispersed across internal processes and external partners. Product Lifecycle Management (PLM) systems play a significant role in modern product dev...

    Rohit Ranchal, Bharat Bhargava in Quality, Reliability, Security and Robustn… (2013)

  15. Chapter and Conference Paper

    A Case for Societal Digital Security Culture

    Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems ...

    Lotfi Ben Othmane, Harold Weffers in Security and Privacy Protection in Informa… (2013)

  16. No Access

    Chapter and Conference Paper

    Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection

    Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ART...

    Nelcileno Araújo, Ruy de Oliveira in Recent Trends in Computer Networks and Dis… (2012)

  17. Chapter and Conference Paper

    A Kolmogorov Complexity Approach for Measuring Attack Path Complexity

    The difficulty associated with breaching an enterprise network is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker successful...

    Nwokedi Idika, Bharat Bhargava in Future Challenges in Security and Privacy … (2011)

  18. No Access

    Reference Work Entry In depth

    Flex Transactions

    Aidong Zhang, Bharat Bhargava in Encyclopedia of Database Systems (2009)

  19. No Access

    Article

    CollectCast: A peer-to-peer service for media streaming

    We present CollectCast, a peer-to-peer (P2P) service for media streaming where a receiver peer is served by multiple sender peers. CollectCast operates at the application level but infers underlying network pr...

    Mohamed Hefeeda, Ahsan Habib, Dongyan Xu, Bharat Bhargava in Multimedia Systems (2005)

  20. No Access

    Chapter and Conference Paper

    Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations

    In this paper, we report some experiments and observations to make browsing of images more adaptable using small devices. We highlight the usability of such an alternative in mobile e-commerce and bandwidthcon...

    Atul Kumar, Anjali Bhargava, Bharat Bhargava in Distributed Computing and Internet Technol… (2005)

previous disabled Page of 4