Dokumente Fakultät für Mathematik und Informatik (inkl. GAUSS) nach Gutachter "Fu, Xiaoming Prof. Dr."
Anzeige 1-20 von 37
-
A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks
(2012-12-21)A Mobile Ad hoc NETwork (MANET) is an infrastructureless self-configuring network in that nodes themselves create and manage the network in a self-organized manner. Nodes can communicate only with their neighbors that ... -
A Content-Oriented Architecture for Publish/Subscribe Systems
(2015-04-01)With the user behavior of Internet shifting towards data dissemination and retrieval, Information Centric Networking (ICN) is proposed to suit these demands. ICN treats content as the first-class entity, with nodes exchanging ... -
A Multi-objective Ant Colony Optimisation-based Routing Approach for Wireless Sensor Networks Incorporating Trust
(2012-08-31)In the near future, Wireless Sensor Networks (WSNs) are expected to play an important role for sensing applications, in the civilian as well as in the military sector. WSNs are autonomous, distributed, self-organised ... -
A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs
(2018-12-20)As Mobile Ad hoc NETworks (MANETs) grow more popular and are deployed as solutions in various applications such as road safety in Vehicular Ad hoc NETworks (VANETs), wildlife tracking in Wireless Sensor Networks (WSNs) and ... -
A Study of VoIP Performance in Anonymous Network - The Onion Routing (Tor)
(2014-06-23)Information technology is developing rapidly, especially in the field of computer science, telecommunications and information systems. In the early days of telecommunications, voice networks could not be combined with data ... -
Anonymity and Privacy in Wireless Mobile Ad Hoc Networks
(2012-11-21)Privacy has become a necessary property of networks as being considered as an important aspect of security by both network providers and customers. Privacy in general means to conceal one's personal information from others ... -
Architectural Support for Implementing Service Function Chains in the Internet
(2019-03-01)Network Functions (NFs) have a crucial role in today’s Internet infrastructure. They provide additional services on top of plain connectivity such as content caching, Network Address Translation (NAT), etc. However, ... -
Automated Provisioning of Fairly Priced Resources
(2018-07-03)In recent times, cloud service providers are increasingly offering more complex services. These complex services are heterogeneous and composed dynamically from traditional services such as IaaS, SaaS, and PaaS to handle ... -
Consumer Behavior Analysis and Repeat Buyer Prediction for E-commerce
(2019-12-16)The proliferation of mobile devices especially smart phones brings remarkable opportunities for both industry and academia. In particular, the massive data generated from users' usage logs provide the possibilities for ... -
Content Agnostic Malware Detection in Networks
(2012-07-04)Bots are the root cause of many security problems on the Internet - they send spam, steal information from infected machines, and perform distributed denial of service attacks. Given their security impact, it is not ... -
Cooperative Internet Access in Resource Constrained Environments
(2011-04-07)Access to the Internet has become available at virtually any place in developed and developing countries, either by fixed-line or wireless access. The Internet users are used to check ... -
Decentralized Network Based Mobility Management: Framework, System Design and Evaluation
(2011-09-23)The handling of mobile nodes in the Internet has always been challenging since the Internet Protocol (IP) by design assumes that a network interface has an identifier that stays fixed at ... -
Distributed Anomaly Detection and Prevention for Virtual Platforms
(2015-07-24)An increasing number of applications are being hosted on cloud based platforms. Cloud platforms are serving as a general computing facility and applications being hosted on these platforms range from simple multi-tier web ... -
Efficient Data Management and Policy Composition for Software-defined Networking
(2019-08-29)Network softwarization changes the way how should networks be managed. Introducing Software-defined Networking in the last decade helps network administrators focus on network management and write optimized applications ... -
Efficient Range-Free Monte-Carlo-Localization for Mobile Wireless Sensor Networks
(2015-12-03)A major problem of localization algorithms for Wireless Sensor Networks (WSNs) is the dependence on anchor information. In mobile networks, single node or even whole parts of the network might be temporarily isolated from ... -
Firewall Traversal in Mobile IPv6 Networks
(2008-11-26)Middleboxes such as firewalls are an important aspect for a majority of IP networks today. Current IP networks are predominantly based on IPv4 technology, and hence various firewalls as ... -
Identification of Online Users' Social Status via Mining User-Generated Data
(2019-09-11)With the burst of available online user-generated data, identifying online users’ social status via mining user-generated data can play a significant role in many commercial applications, research and policy-making in many ... -
Imbalance Learning and Its Application on Medical Datasets
(2021-05-28)To gain more valuable information from the increasing large amount of data, data mining has been a hot topic that attracts growing attention in this two decades. One of the challenges in data mining is imbalance learning, ... -
Increasing the robustness of active upper limb prostheses
(2017-02-02)This thesis is based on my work done at the Institute for Neurorehabilitation Systems at the University Medical Center Goettingen. My work has been partially founded by German Ministry for Education and Research (BMBF) via ... -
Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation
(2012-09-26)Spam is still an open problem from the network operator's perspective. The common state-of-the-art strategy is to place filters against spam at the recipient's edge. Although this strategy largely solves the spam problem ...