With the increasing number of computers on the Internet, there is a growing interest in harnessing the unused and inexpensive computational resources over the Internet. However, current approaches such as the Grid computing paradigm are not sufficient. We present our preliminary work that uses extends Peer-2-Peer (P2P) computing with a framework that allows… (More)
Race condition attacks occur when a process performs a sequence of operations on a file, under the assumption that the operations are being executed "atomically". This can be exploited by a malicious process which changes the characteristics of that file between two successive operations on it by a victim process, thus, inducing the victim process to… (More)
Image compression can be done in two ways namely lossy or lossless. Lossy methods are used for expected results like photographs where some negligible loss of data is tolerable. Rapid growth of medical science such as ehealth and telemedicine requires lossless Image compression. The correlation and redundancy which exists across different medical images are… (More)
Security is becoming the primary concern of society. Having a security system is therefore becoming a requirement. Video surveillance plays a vital role in security systems. Consider a video stream taken by a fixed camera to monitor motion-restricted area. The system works on a real-time video,from the camera, which is accessed frame to frame. The proposed… (More)
We propose a remote file system for use in desktop grid applications. The proposed system provides programs with the ability to query and update files on remote machines without requiring any changes to the program code. The system (a) generates a profile of the program file operations and (b) uses the profile to implement collective and pre-fetched I/O.