With the increasing number of computers on the Internet, there is a growing interest in harnessing the unused and inexpensive computational resources over the Internet. However, current approaches such as the Grid computing paradigm are not sufficient. We present our preliminary work that uses extends Peer-2-Peer (P2P) computing with a framework that allows… (More)
Race condition attacks occur when a process performs a sequence of operations on a file, under the assumption that the operations are being executed "atomically". This can be exploited by a malicious process which changes the characteristics of that file between two successive operations on it by a victim process, thus, inducing the victim process to… (More)
With an aging global population, it is important that clinicians empower their patients. Empowering the patient-physician interaction leads to a more positive health outcome. This chapter discusses the potential of adopting Customer Relationship Management (CRM) as a way of guiding non-critical care services (i.e. linking the problems of customer-focused… (More)
Image compression can be done in two ways namely lossy or lossless. Lossy methods are used for expected results like photographs where some negligible loss of data is tolerable. Rapid growth of medical science such as ehealth and telemedicine requires lossless Image compression. The correlation and redundancy which exists across different medical images are… (More)
" Prediction is very difficult, especially if it's about the future. "-Niels Bohr Since the early days of mankind, man has always been fascinated by the idea of knowing future. Data is being captured at a rate never before seen in history. The retailer's goal is to translate that data into bottom line profits & Predictive analytics makes that possible. The… (More)
Security is becoming the primary concern of society. Having a security system is therefore becoming a requirement. Video surveillance plays a vital role in security systems. Consider a video stream taken by a fixed camera to monitor motion-restricted area. The system works on a real-time video,from the camera, which is accessed frame to frame. The proposed… (More)
Security is becoming the primary concern of society due to a booming population, increasing scarcity of jobs, growing problems especially in urban cities, and the number of antisocial activities, etc. Having a security system is therefore becoming a requirement. Surveillance camera's output, when monitored, can track unauthorized objects from causing a… (More)
We propose a remote file system for use in desktop grid applications. The proposed system provides programs with the ability to query and update files on remote machines without requiring any changes to the program code. The system (a) generates a profile of the program file operations and (b) uses the profile to implement collective and pre-fetched I/O.