Foreword of Special Issue on "Nomadic Services and Applications"
@article{Hung2011ForewordOS, title={Foreword of Special Issue on "Nomadic Services and Applications"}, author={Jason Chi-Shun Hung}, journal={J. Networks}, year={2011}, volume={6}, pages={687-688} }
Nomadic Service has emerged rapidly as an exciting new paradigm that offers a challenging model of cyber-physical services and poses fascinating problems regarding distributed resource management, ranging from information sharing to cooperative computing. This special issue is intended to foster state-of-the-art research in the area of nomadic services and related applications, cloud computing technologies and services, including the topics of collaboration environment, implementation and…
Figures and Tables from this paper
2 Citations
Monitoring Technology and Efficient Particle Searching Algorithm for SPH Model
- Computer Science
- 2013
To supervise and control the whole simulation of Smoothed Particle Hydrodynamics (SPH) model, a mixed language programming (MLP) method is particularly described that will not only take advantages of…
Research on evaluation of public sports service in stadiums based on FNN algorithm
- EducationCluster Computing
- 2018
The fuzzy evaluation procedure and index of public sports service in stadiums are selected and determined according to the weight ratio and FNN algorithm for improving hidden nodes is introduced to solve the model based on the idea of neural network.
References
SHOWING 1-10 OF 24 REFERENCES
TTDD: Two-Tier Data Dissemination in Large-Scale Wireless Sensor Networks
- Computer ScienceWirel. Networks
- 2005
TTDD is described, a Two-Tier Data Dissemination approach that provides scalable and efficient data delivery to multiple, mobile sinks that handles sink mobility effectively with performance comparable with that of stationary sinks.
A coordination-based data dissemination protocol for wireless sensor networks
- Computer ScienceProceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004.
- 2004
CODE is a coordination-based data dissemination protocol for wireless sensor networks that considers energy efficiency and network lifetime, especially for sensor networks with high node density, and is based on a grid structure.
SSL Man-in-the-Middle Attacks
- Computer Science
- 2009
This paper examines the mechanics of the SSL protocol attack, then focusses on the greater risk of SSL attacks when the client is not properly implemented or configured, and posed by unprotected systems where an attacker can preload his/her own trusted root authority certificates.
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
- Computer ScienceSenSys '03
- 2003
This paper proposes SEAD, a Scalable Energy-efficient Asynchronous Dissemination protocol, to minimize energy consumption in both building the dissemination tree and disseminating data to mobile sinks to create near-optimal dissemination trees.
Research on the Freeness of Subliminal Channels in ElGamal-Type Signatures
- Computer Science
- 2004
A new subliminal-free protocol in ElGamal-Type signatures is designed in which the warden covers all the data generated by the signer and finishes the signature, but he can not forge the signatures.
Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
- Computer ScienceISPEC
- 2005
Evidence is provided that most web browsers have severe weaknesses in the browser-to-user communication (graphical user interface), which attackers can exploit to fool users about the presence of a secure SSL/TLS connection and make them disclose secrets to attackers.
HTTPS Hacking Protection
- Computer Science21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)
- 2007
This paper presents 3 different methodologies to prevent the decoding using SSL-MITM on the confidential data which normally traverses over e-commerce Web sites, and evaluation of 3 schemes is conducted to show the degrees of efficiency of the techniques.
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
- Computer ScienceWWW '05
- 2005
This work proposes context-sensitive certificate verification (CSCV), whereby the browser interrogates the user about the context in which a certificate verification error occurs, and guides the user in handling and possibly overcoming the security error.
Man-in-the-Middle Attack to the HTTPS Protocol
- Computer ScienceIEEE Security & Privacy Magazine
- 2009
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data…
A multilayer perceptron-based medical decision support system for heart disease diagnosis
- Computer Science, MedicineExpert Syst. Appl.
- 2006