Browsing Fakultät für Mathematik und Informatik (inkl. GAUSS) by Advisor & Referee "Fu, Xiaoming Prof. Dr."
Now showing items 21-40 of 46
-
Short-Latency Brain-Computer Interface Using Movement-Related Cortical Potentials
(2016-08-09)In recent years, brain-computer interface (BCI) has been developing as a communication and rehabilitation tool for patients with neurological diseases, such as stroke and spinal cord injury. This system decodes the user's ... -
Data-Driven Network Analysis and Applications
(2016-01-08)Data is critical for scientific research and engineering systems. However, data collection procedures are often subject to high cost or heavy loss rate. It is challenging to accurately estimate missing or unobserved data ... -
Efficient Range-Free Monte-Carlo-Localization for Mobile Wireless Sensor Networks
(2015-12-03)A major problem of localization algorithms for Wireless Sensor Networks (WSNs) is the dependence on anchor information. In mobile networks, single node or even whole parts of the network might be temporarily isolated from ... -
Dynamic Resource Scheduling in Cloud Data Center
(2015-10-26)Cloud infrastructure provides a wide range of resources and services to companies and organizations, such as computation, storage, database, platforms, etc. These resources and services are used to power up and scale out ... -
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol
(2015-09-11)This dissertation tackles the problem of user privacy and security of transactions in the authentication protocols of the technology of Radio-frequency identification (RFID). Radio-frequency identification is ubiquitously ... -
Distributed Anomaly Detection and Prevention for Virtual Platforms
(2015-07-24)An increasing number of applications are being hosted on cloud based platforms. Cloud platforms are serving as a general computing facility and applications being hosted on these platforms range from simple multi-tier web ... -
Planning and Optimization During the Life-Cycle of Service Level Agreements for Cloud Computing
(2015-06-10)A Service Level Agreement (SLA) is an electronic contract between the consumer and the provider of a service. It governs their business relationship by clarifying expectations and obligations of participating entities, ... -
A Content-Oriented Architecture for Publish/Subscribe Systems
(2015-04-01)With the user behavior of Internet shifting towards data dissemination and retrieval, Information Centric Networking (ICN) is proposed to suit these demands. ICN treats content as the first-class entity, with nodes exchanging ... -
Towards a Robust and Secure Decentralized Online Social Network
(2015-01-15)The virtually unlimited growth of popular Online Social Networks (OSNs) is often accompanied by severe violations of their users' privacy and intellectual property rights. Both problems are rooted in the centralized ... -
Online Social Network Data Placement over Clouds
(2014-08-11)Internet services today are often deployed and operated in data centers and clouds; users access and use the services by connecting to such data centers from their computing devices. For availability, fault tolerance, and ... -
A Study of VoIP Performance in Anonymous Network - The Onion Routing (Tor)
(2014-06-23)Information technology is developing rapidly, especially in the field of computer science, telecommunications and information systems. In the early days of telecommunications, voice networks could not be combined with data ... -
Social-Based Data Routing Strategies in Delay Tolerant Networks
(2014-04-03)Delay Tolerant networks (DTNs) are intermittently connected mobile networks in which the end-to-end paths do not exist. Data delivery in such networks relies upon the contacts that use "store-carry-and-forward" paradigm ... -
Verification of Security Properties Using Formal Techniques
(2014-02-12)Nowadays, the necessity of developing collaborative and distributed computing systems makes networks, and specially Internet, the key element of the system design process. Several new applications have been appeared in ... -
Web-based Stereoscopic Collaboration for Medical Visualization
(2013-09-26)Medical volume visualization is a valuable tool in medical practice and education to virtually explore volume data of the human body. Real-time interaction, stereoscopic presentation, and collaboration are required for its ... -
A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks
(2012-12-21)A Mobile Ad hoc NETwork (MANET) is an infrastructureless self-configuring network in that nodes themselves create and manage the network in a self-organized manner. Nodes can communicate only with their neighbors that ... -
Anonymity and Privacy in Wireless Mobile Ad Hoc Networks
(2012-11-21)Privacy has become a necessary property of networks as being considered as an important aspect of security by both network providers and customers. Privacy in general means to conceal one's personal information from others ... -
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation
(2012-09-26)Spam is still an open problem from the network operator's perspective. The common state-of-the-art strategy is to place filters against spam at the recipient's edge. Although this strategy largely solves the spam problem ... -
A Multi-objective Ant Colony Optimisation-based Routing Approach for Wireless Sensor Networks Incorporating Trust
(2012-08-31)In the near future, Wireless Sensor Networks (WSNs) are expected to play an important role for sensing applications, in the civilian as well as in the military sector. WSNs are autonomous, distributed, self-organised ... -
Content Agnostic Malware Detection in Networks
(2012-07-04)Bots are the root cause of many security problems on the Internet - they send spam, steal information from infected machines, and perform distributed denial of service attacks. Given their security impact, it is not ... -
Decentralized Network Based Mobility Management: Framework, System Design and Evaluation
(2011-09-23)The handling of mobile nodes in the Internet has always been challenging since the Internet Protocol (IP) by design assumes that a network interface has an identifier that stays fixed at ...