Futuristic Trends in Network and Communication Technologies
First International Conference, FTNCT 2018, Solan, India, February 9–10, 2018, Revised Selected Papers
Chapter and Conference Paper
Our world is not homogeneous in nature, it has multiple languages, ethnic groups, culture, beliefs, and varying perceptions of things. There is development towards catering experiences based on these varying d...
Article
Article
Under big data environment, machine learning has been rapidly developed and widely used. It has been successfully applied in computer vision, natural language processing, computer security and other applicatio...
Article
The typical centralized cloud model is poorly suited to latency-sensitive applications requiring low-latency and high-throughput. This paper proposes an integrity-preserving serverless framework for live-video...
Book and Conference Proceedings
First International Conference, FTNCT 2018, Solan, India, February 9–10, 2018, Revised Selected Papers
Chapter and Conference Paper
Extracting relevant patterns from heterogeneous data streams poses significant computational and analytical challenges. Further, identifying such patterns and pushing analogous content to interested parties ac...
Article
In the original version of this article, four co-authors and some texts of acknowledgement were missing.
Reference Work Entry In depth
Chapter and Conference Paper
In service-oriented architecture, services can communicate and share data amongst themselves. It is necessary to provide role-based access control for data. In addition, data leakages made by authorized insid...
Living Reference Work Entry In depth
Article
Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing ...
Article
Article
Mobile systems have limited resources, such as battery life, network bandwidth, storage capacity, and processor performance. These restrictions may be alleviated by computation offloading: sending heavy computati...
Chapter and Conference Paper
Enterprises operate in a global economy with their operations dispersed across internal processes and external partners. Product Lifecycle Management (PLM) systems play a significant role in modern product dev...
Chapter and Conference Paper
Information and communication technology systems, such as remote health care monitoring and smart mobility applications, have become indispensable parts of our lives. Security vulnerabilities in these systems ...
Chapter and Conference Paper
Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ART...
Chapter and Conference Paper
The difficulty associated with breaching an enterprise network is commensurate with the security of that network. A security breach, or a security policy violation, occurs as a result of an attacker successful...
Reference Work Entry In depth
Article
We present CollectCast, a peer-to-peer (P2P) service for media streaming where a receiver peer is served by multiple sender peers. CollectCast operates at the application level but infers underlying network pr...
Chapter and Conference Paper
In this paper, we report some experiments and observations to make browsing of images more adaptable using small devices. We highlight the usability of such an alternative in mobile e-commerce and bandwidthcon...