Dokumente Fakultät für Mathematik und Informatik (inkl. GAUSS) nach Gutachter "Fu, Xiaoming Prof. Dr."
Anzeige 21-37 von 37
-
Media Distribution using Overlay Multicast and Peer-to-Peer Technologies
(2008-12-03)The explosive growth of multimedia services and applications (e.g. media streaming) demands an efficient, deployable media distribution system on the Internet. Although native IP multicast ... -
Network Friendly Congestion Control: Framework, Protocol Design and Evaluation
(2010-11-26)The increase in bandwidth, the number of internet users and the variety of internet applications, all point towards the need for adaptive and flexible internet protocols. Alternatively, ... -
On Localization Issues of Mobile Devices
(2018-11-05)Mobile devices, such as sensor nodes, smartphones and smartwatches, are now widely used in many applications. Localization is a highly important topic in wireless networks as well as in many Internet of Things applications. ... -
PHOENIX: A Premise to Reinforce Heterogeneous and Evolving Internet Architectures with Exemplary Applications
(2020-12-02)The Internet was designed primarily for sharing expensive resources through establishing point-to-point connection using dedicated IP addresses. However, it has since evolved both in complexity and its number of users. ... -
Planning and Optimization During the Life-Cycle of Service Level Agreements for Cloud Computing
(2015-06-10)A Service Level Agreement (SLA) is an electronic contract between the consumer and the provider of a service. It governs their business relationship by clarifying expectations and obligations of participating entities, ... -
Secure Localization in Wireless Sensor Networks
(2022-05-10)With the growing popularity of the Internet of Things, Wireless Sensor Networks also only grow more and more common in various different forms. However, sensor data is often only useful in connection with information about ... -
Secure Routing in Intelligent Device-to-Device Communications
(2016-12-02)Device-to-Device (D2D) communications have received exceptional attention nowadays due to the overabundance number of applications and services. Therefore, D2D is expected to be a vital technical component in Internet of ... -
Service-Differentiated Cooperative Routing in the Internet of Things
(2023-11-06)The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) was designed to operate with different Internet of Things (IoT) applications ranging from regular, to critical, to alarm/sporadic. That is due to its ability ... -
Short-Latency Brain-Computer Interface Using Movement-Related Cortical Potentials
(2016-08-09)In recent years, brain-computer interface (BCI) has been developing as a communication and rehabilitation tool for patients with neurological diseases, such as stroke and spinal cord injury. This system decodes the user's ... -
Social-Based Data Routing Strategies in Delay Tolerant Networks
(2014-04-03)Delay Tolerant networks (DTNs) are intermittently connected mobile networks in which the end-to-end paths do not exist. Data delivery in such networks relies upon the contacts that use "store-carry-and-forward" paradigm ... -
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol
(2015-09-11)This dissertation tackles the problem of user privacy and security of transactions in the authentication protocols of the technology of Radio-frequency identification (RFID). Radio-frequency identification is ubiquitously ... -
Towards a Robust and Secure Decentralized Online Social Network
(2015-01-15)The virtually unlimited growth of popular Online Social Networks (OSNs) is often accompanied by severe violations of their users' privacy and intellectual property rights. Both problems are rooted in the centralized ... -
Triadic Closure and Its Influence in Social Networks
(2016-09-12)Social triad—a group of three people—is one of the simplest and most fundamental social groups, which serves as the basis of social network analysis. Triadic closure, a closing process of an open triad, is a useful ... -
User Attribute Inference via Mining User-Generated Data
(2020-12-03)User attributes refer to a person's various demographic characteristics, like income, education, job, age, gender, socioeconomic status (SES), etc. User attributes play an important role in many research areas like sociology ... -
User identification and community exploration via mining big personal data in online platforms
(2021-10-19)User-generated big data mining is vital important for large online platforms in terms of security, profits improvement, products recommendation and system management. Personal attributes recognition, user behavior prediction, ... -
Verification of Security Properties Using Formal Techniques
(2014-02-12)Nowadays, the necessity of developing collaborative and distributed computing systems makes networks, and specially Internet, the key element of the system design process. Several new applications have been appeared in ... -
Web-based Stereoscopic Collaboration for Medical Visualization
(2013-09-26)Medical volume visualization is a valuable tool in medical practice and education to virtually explore volume data of the human body. Real-time interaction, stereoscopic presentation, and collaboration are required for its ...