[PDF][PDF] Implementing smart homes with open source solutions

HT Lin - International Journal of Smart Home, 2013 - gvpress.com
A Smart home provides living environment with comfortable, convenient, energy saving,
safety and health care place to people live in. From technology viewpoint, its core is …

Cloud-based image processing system with priority-based data distribution mechanism

TY Wu, CY Chen, LS Kuo, WT Lee, HC Chao - Computer Communications, 2012 - Elsevier
Most users process short tasks using MapReduce. In other words, most tasks handled by the
Map and Reduce functions require low response time. Currently, quite few users use …

Factors influencing the adoption of enterprise cloud computing

SG Lee, SW Hwang, JY Kang, S Yoon - 網際網路技術學刊, 2014 - airitilibrary.com
As cloud computing becomes more common, there is growing need for studies to consider
various factors that either facilitate or hinder its adoption in an effort to reduce the hesitation …

[PDF][PDF] Cloud-based image processing with data priority distribution mechanism

V Sathish, TA Sangeetha - Journal of Computer Applications (JCA), 2013 - Citeseer
MapReduce. In other words, most tasks handled by the Map and Reduce functions require
low response time. Currently, quite few users use MapReduce for 2D to 3D image …

Effective smart home system based on flexible cost in Pakistan

SM Shaheed, MSB Ilyas, JA Sheikh… - 2017 Fourth HCT …, 2017 - ieeexplore.ieee.org
The smart home system is growing up quickly however in Pakistan majority of people are
unaware about it. Due to maximum cost of home automation kit, the average person cannot …

Trend sensing via Twitter

YS Yilmaz, MF Bulut, CG Akcora… - … Journal of Ad Hoc …, 2013 - inderscienceonline.com
Due to its ever increasing popularity, Twitter has become a pervasive information outlet. In
this paper, we present a passive sensing framework for identifying trends via Twitter. In our …

Redball: Throttling shrew attack in cloud data center networks

Z Feng, B Bai, B Zhao, J Su - 網際網路技術學刊, 2012 - airitilibrary.com
In homeland security and defense, cloud security is critical. As an increasing number of
governments and organizations outsource their computing to the cloud, they at the same …

Mitigation of random query string DoS via gossip

S Ferretti, V Ghini - … Conference on Information Systems, Technology and …, 2012 - Springer
This paper presents a mitigation scheme to cope with the random query string Denial of
Service (DoS) attack, which is based on a vulnerability of current Content Delivery Networks …

Research on CDN network architecture design and safety protection for power grid

CG Zhang, Y Zou, YR Wang, CS Li… - International Journal of …, 2016 - inderscienceonline.com
Based on a large amount of investigation, analysis and research of the application system
status and network status of the power grid, the paper introduces a novel CDN network …

[BOK][B] Grid and cloud computing: Technologies, applications, market sectors, and workloads

S Altowaijri - 2013 - search.proquest.com
Developments in electronics, computing and communication technologies have transformed
IT systems from desktop and tightly coupled mainframe computers of the past to modem day …