Browsing Fakultät für Mathematik und Informatik (inkl. GAUSS) by Referee "Fu, Xiaoming Prof. Dr."
Now showing items 21-37 of 37
-
Planning and Optimization During the Life-Cycle of Service Level Agreements for Cloud Computing
(2015-06-10)A Service Level Agreement (SLA) is an electronic contract between the consumer and the provider of a service. It governs their business relationship by clarifying expectations and obligations of participating entities, ... -
A Content-Oriented Architecture for Publish/Subscribe Systems
(2015-04-01)With the user behavior of Internet shifting towards data dissemination and retrieval, Information Centric Networking (ICN) is proposed to suit these demands. ICN treats content as the first-class entity, with nodes exchanging ... -
Towards a Robust and Secure Decentralized Online Social Network
(2015-01-15)The virtually unlimited growth of popular Online Social Networks (OSNs) is often accompanied by severe violations of their users' privacy and intellectual property rights. Both problems are rooted in the centralized ... -
A Study of VoIP Performance in Anonymous Network - The Onion Routing (Tor)
(2014-06-23)Information technology is developing rapidly, especially in the field of computer science, telecommunications and information systems. In the early days of telecommunications, voice networks could not be combined with data ... -
Social-Based Data Routing Strategies in Delay Tolerant Networks
(2014-04-03)Delay Tolerant networks (DTNs) are intermittently connected mobile networks in which the end-to-end paths do not exist. Data delivery in such networks relies upon the contacts that use "store-carry-and-forward" paradigm ... -
Verification of Security Properties Using Formal Techniques
(2014-02-12)Nowadays, the necessity of developing collaborative and distributed computing systems makes networks, and specially Internet, the key element of the system design process. Several new applications have been appeared in ... -
Web-based Stereoscopic Collaboration for Medical Visualization
(2013-09-26)Medical volume visualization is a valuable tool in medical practice and education to virtually explore volume data of the human body. Real-time interaction, stereoscopic presentation, and collaboration are required for its ... -
A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks
(2012-12-21)A Mobile Ad hoc NETwork (MANET) is an infrastructureless self-configuring network in that nodes themselves create and manage the network in a self-organized manner. Nodes can communicate only with their neighbors that ... -
Anonymity and Privacy in Wireless Mobile Ad Hoc Networks
(2012-11-21)Privacy has become a necessary property of networks as being considered as an important aspect of security by both network providers and customers. Privacy in general means to conceal one's personal information from others ... -
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation
(2012-09-26)Spam is still an open problem from the network operator's perspective. The common state-of-the-art strategy is to place filters against spam at the recipient's edge. Although this strategy largely solves the spam problem ... -
A Multi-objective Ant Colony Optimisation-based Routing Approach for Wireless Sensor Networks Incorporating Trust
(2012-08-31)In the near future, Wireless Sensor Networks (WSNs) are expected to play an important role for sensing applications, in the civilian as well as in the military sector. WSNs are autonomous, distributed, self-organised ... -
Content Agnostic Malware Detection in Networks
(2012-07-04)Bots are the root cause of many security problems on the Internet - they send spam, steal information from infected machines, and perform distributed denial of service attacks. Given their security impact, it is not ... -
Decentralized Network Based Mobility Management: Framework, System Design and Evaluation
(2011-09-23)The handling of mobile nodes in the Internet has always been challenging since the Internet Protocol (IP) by design assumes that a network interface has an identifier that stays fixed at ... -
Cooperative Internet Access in Resource Constrained Environments
(2011-04-07)Access to the Internet has become available at virtually any place in developed and developing countries, either by fixed-line or wireless access. The Internet users are used to check ... -
Network Friendly Congestion Control: Framework, Protocol Design and Evaluation
(2010-11-26)The increase in bandwidth, the number of internet users and the variety of internet applications, all point towards the need for adaptive and flexible internet protocols. Alternatively, ... -
Media Distribution using Overlay Multicast and Peer-to-Peer Technologies
(2008-12-03)The explosive growth of multimedia services and applications (e.g. media streaming) demands an efficient, deployable media distribution system on the Internet. Although native IP multicast ... -
Firewall Traversal in Mobile IPv6 Networks
(2008-11-26)Middleboxes such as firewalls are an important aspect for a majority of IP networks today. Current IP networks are predominantly based on IPv4 technology, and hence various firewalls as ...