Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2022
Stochastic model-driven capacity planning framework for multi-access edge computing
AbstractMulti-access edge computing (MEC) offers cloud computing capabilities and IT services situated at the Radio Access Network (RAN) in the mobile users’ proximity. Applications could offload their computation-intensive tasks to the MEC servers. ...
- research-articleSeptember 2020
Discrimination-aware trust management for social internet of things
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 178, Issue Chttps://doi.org/10.1016/j.comnet.2020.107254Highlights- Context-based trust estimation to service providers.
- Detection of ...
Internet of Things combined with social networks, has emerged as an interesting research area which is referred to as Social Internet of Things (SIoT). Objects in SIoT interact with each other based on their social behavior. In this ...
- research-articleJune 2018
Bottom-up sequential anonymization in the presence of adversary knowledge
Information Sciences: an International Journal (ISCI), Volume 450, Issue CPages 316–335https://doi.org/10.1016/j.ins.2018.03.027In many real world situations, data are updated and released over time. In sequential data publishing, the number of attributes and records may vary and the attribute values may be modified in different releases. This might lead to a compromise in ...
- research-articleMay 2017
Performability analysis of cloudlet in mobile cloud computing
Information Sciences: an International Journal (ISCI), Volume 388, Issue CPages 99–117https://doi.org/10.1016/j.ins.2017.01.030In the Cloudlet architecture of Mobile Cloud Computing (MCC), a mobile device, in order to overcome its lack of resources, offloads resource-intensive tasks on a nearby and self-managed cloud-based data center (i.e., cloudlet). In this architecture, a ...
- articleMarch 2017
Analytical performance models for resource allocation schemes of cloudlet in mobile cloud computing
The Journal of Supercomputing (JSCO), Volume 73, Issue 3Pages 1274–1305In the cloudlet architecture of mobile cloud computing (MCC), the mobile users offload their resource-intensive tasks to a local cloud (i.e., Cloudlet) via WiFi connections, to overcome the resource-constrained nature of mobile devices. The users of ...
-
- research-articleJanuary 2017
Modeling and performance analysis of cloudlet in Mobile Cloud Computing
Performance Evaluation (PEVA), Volume 107, Issue CPages 34–53https://doi.org/10.1016/j.peva.2016.10.005Mobile Cloud Computing (MCC) is an emerging technology to overcome the resource-constrained nature of mobile devices by offloading the resource-intensive operations to cloud-based data centers. The characteristics of MCC, including the mobility, the ...
- research-articleDecember 2016
An efficient medium access control protocol for WSN-UAV
Recent advances in Unmanned Aerial Vehicle (UAV) technologies have enhanced Wireless Sensor Networks (WSNs) by offering a UAV as a mobile data gathering node. These systems are called WSN-UAV that are well-suited for remote monitoring and emergency ...
- articleAugust 2016
Game of energy consumption balancing in heterogeneous sensor networks
Wireless Communications & Mobile Computing (WCMC), Volume 16, Issue 12Pages 1457–1477https://doi.org/10.1002/wcm.2606In a multi-hop sensor network, sensors largely rely on other nodes as a traffic relay to communicate with targets that are not reachable by one hop. Depending on the topology and position of nodes, some sensors receive more relaying traffic and lose ...
- research-articleJune 2016
Hierarchical anonymization algorithms against background knowledge attack in data releasing
Knowledge-Based Systems (KNBS), Volume 101, Issue CPages 71–89https://doi.org/10.1016/j.knosys.2016.03.004We define a privacy model based on k-anonymity and one of its strong refinements to prevent the background knowledge attack.We propose two hierarchical anonymization algorithm to satisfy our privacy model.Our algorithms outperform the state-of the art ...
- articleDecember 2015
Analytical performance model for mobile network operator cloud
The Journal of Supercomputing (JSCO), Volume 71, Issue 12Pages 4555–4577https://doi.org/10.1007/s11227-015-1551-4The characteristics of mobile cloud computing (MCC) including, mobility, the instability of 3G/WiFi connections, and the complexity of virtualization, make the prediction of performance challenging. To deal with these issues, an analytical performance ...
- research-articleOctober 2015
Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centers
Computers and Electrical Engineering (CENG), Volume 47, Issue CPages 173–185https://doi.org/10.1016/j.compeleceng.2015.08.001Display Omitted We propose a game for reducing power consumption in data centers.We show that the game always converges to a pure Nash equilibrium.We establish upper bounds on the convergence time of the game.We prove that PoA=1.23.We show that PoS1. ...
- articleSeptember 2015
Strategic Network Formation Game for Energy Consumption Balancing
Wireless Personal Communications: An International Journal (WPCO), Volume 84, Issue 2Pages 841–865https://doi.org/10.1007/s11277-015-2664-zCreation of hot-spots is unavoidable, in multihop wireless sensor networks using the least power (or shortest path) routing method. This happens due to the irregularity of underlying network structures. Since hot-spots lose their energy faster than ...
- articleAugust 2013
Distributed fair DRAM scheduling in network-on-chips architecture
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 59, Issue 7Pages 543–550https://doi.org/10.1016/j.sysarc.2013.03.004Memory access scheduling is an effective manner to improve performance of Chip Multi-Processors (CMPs) by taking advantage of the timing characteristics of a DRAM. A memory access scheduler can subdivide resources utilization (banks and rows) to ...
- articleMay 2013
Neighbor Selection Game in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 70, Issue 2Pages 617–640https://doi.org/10.1007/s11277-012-0711-6In wireless ad hoc networks, there is no infrastructure to enforce cooperation between nodes. As a result, nodes may act selfishly when running network protocols to conserve their energy resources as much as possible. In this paper, we consider the "...
- ArticleMarch 2013
A Risk Taking Routing Algorithm for Delay Tolerant Networks
AINA '13: Proceedings of the 2013 IEEE 27th International Conference on Advanced Information Networking and ApplicationsPages 284–289https://doi.org/10.1109/AINA.2013.128Delay Tolerant Networks (DTNs) suffer from frequent disruptions and partitioning. Because of dynamic environment and lack of knowledge about the whole network topology, routing is quiet challenging in DTNs. Prediction based algorithms in DTNs are able ...
- ArticleAugust 2012
A New Algorithm for Positive Influence Dominating Set in Social Networks
ASONAM '12: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)Pages 253–257https://doi.org/10.1109/ASONAM.2012.51Positive Influence Dominating Set (PIDS) has applications in Online Social Networks (OSN) such as Viral Marketing and College Drinking Problem. To many reasons finding Minimum PIDS (MPIDS) is very desirable. Beside, one of the most important features ...
- ArticleJune 2012
Reliability-Aware Task Allocation in Distributed Computing Systems using Hybrid Simulated Annealing and Tabu Search
HPCC '12: Proceedings of the 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and SystemsPages 1088–1095https://doi.org/10.1109/HPCC.2012.159Reliability is one of the important issues in the design of distributed computing systems (DCSs). This paper deals with the problem of task allocation in heterogeneous DCSs for maximizing system reliability with several resource constraints. Memory ...
- research-articleMarch 2012
A real-time data aggregation method for fault-tolerant wireless sensor networks
SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied ComputingPages 605–612https://doi.org/10.1145/2245276.2245393Data aggregation in wireless sensor networks (WSNs) is known as a method of energy saving through reducing the number of communications. Due to the failure-prone nature of communications in WSNs caused by harsh environments, fault-tolerant aggregation ...
- articleFebruary 2012
Energy-efficient topology control in wireless ad hoc networks with selfish nodes
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 56, Issue 2Pages 902–914https://doi.org/10.1016/j.comnet.2011.10.025In wireless ad hoc networks there is no fixed infrastructure or centralized controller to enforce cooperation between nodes. Therefore, nodes may act selfishly in running network protocols for conserving their own energy resources. In this paper, we ...
- ArticleOctober 2011
Suitability of Cloud Computing for Scientific Data Analyzing Applications; An Empirical Study
3PGCIC '11: Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet ComputingPages 193–199https://doi.org/10.1109/3PGCIC.2011.37Increasing amount of data and demand to process and analyze them induces enterprises to employ alternative computing paradigms to overcome computing capacity shortages. Cloud Computing is a new emerged computing approach that promises scalability of ...