Learn More
In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, we propose a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is two-fold. First, we adopt a distributed(More)
Sentiment analysis of the text data available on the web either in the form of blogs or at social media sites such as Twitter, Facebook, and LinkedIn, offers information through which to assess people's perspective of products and services that are of interest to them. Consumers routinely scour the Internet to assess other user's reviews for a product or a(More)
—It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communications. Past proposed secret key generation algorithms under-exploited the available number of secret key bits from the radio channel. This paper proposes a new efficient method for(More)
Secure communications in UWB based on cryptographic keys generated from channel measurements without a trusted third party have been developed. The fine time resolution of UWB allows high levels of mutual information to be obtained by a given A and B through independent characterizations of their shared communication channel. This mutual information(More)
Despite defensive advances, malicious software (malware) remains an ever present cyber-security threat. Cloud environments are far from malware immune, in that: i) they innately support the execution of remotely supplied code, and ii) escaping their virtual machine (VM) confines has proven relatively easy to achieve in practice. The growing interest in(More)
—Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third parties are not be able to accurately estimate the state of the common channels. These properties allow generation of secret keys to support secure communications from UWB(More)
Simulation has become one of the dominant tools in wired and wireless network research. With the advent of cloud, grid, and cluster computing it has become feasible to use parallelization to perform richer larger-scale simulations. Moreover, the computing resources needed to perform statistically rigorous simulations are now easily obtainable. Although a(More)
—This paper presents a practical wavelet-based approach to denoising coarsely quantized signals. Such signals can arise from the status data collected within large-scale engineering plants employing traditional limit checking fault detection and identification (FDI). Transitioning such plants to more advanced FDI techniques requires that the coarsely(More)
Wireless secret key generation (WKG) methods based on communications channel characterizations have gained significant interest as a mechanism for providing secure point-to-point communications. Ultra-wide band (UWB) WKG solutions provide an advantage over narrow- and wide-band approaches in that they can generate secure keys even when Alice and Bob, the(More)