Browsing Fakultät für Mathematik und Informatik (inkl. GAUSS) by Referee "Fu, Xiaoming Prof. Dr."
Now showing items 1-20 of 37
-
Service-Differentiated Cooperative Routing in the Internet of Things
(2023-11-06)The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) was designed to operate with different Internet of Things (IoT) applications ranging from regular, to critical, to alarm/sporadic. That is due to its ability ... -
Secure Localization in Wireless Sensor Networks
(2022-05-10)With the growing popularity of the Internet of Things, Wireless Sensor Networks also only grow more and more common in various different forms. However, sensor data is often only useful in connection with information about ... -
User identification and community exploration via mining big personal data in online platforms
(2021-10-19)User-generated big data mining is vital important for large online platforms in terms of security, profits improvement, products recommendation and system management. Personal attributes recognition, user behavior prediction, ... -
Imbalance Learning and Its Application on Medical Datasets
(2021-05-28)To gain more valuable information from the increasing large amount of data, data mining has been a hot topic that attracts growing attention in this two decades. One of the challenges in data mining is imbalance learning, ... -
User Attribute Inference via Mining User-Generated Data
(2020-12-03)User attributes refer to a person's various demographic characteristics, like income, education, job, age, gender, socioeconomic status (SES), etc. User attributes play an important role in many research areas like sociology ... -
PHOENIX: A Premise to Reinforce Heterogeneous and Evolving Internet Architectures with Exemplary Applications
(2020-12-02)The Internet was designed primarily for sharing expensive resources through establishing point-to-point connection using dedicated IP addresses. However, it has since evolved both in complexity and its number of users. ... -
Consumer Behavior Analysis and Repeat Buyer Prediction for E-commerce
(2019-12-16)The proliferation of mobile devices especially smart phones brings remarkable opportunities for both industry and academia. In particular, the massive data generated from users' usage logs provide the possibilities for ... -
Identification of Online Users' Social Status via Mining User-Generated Data
(2019-09-11)With the burst of available online user-generated data, identifying online users’ social status via mining user-generated data can play a significant role in many commercial applications, research and policy-making in many ... -
Efficient Data Management and Policy Composition for Software-defined Networking
(2019-08-29)Network softwarization changes the way how should networks be managed. Introducing Software-defined Networking in the last decade helps network administrators focus on network management and write optimized applications ... -
Architectural Support for Implementing Service Function Chains in the Internet
(2019-03-01)Network Functions (NFs) have a crucial role in today’s Internet infrastructure. They provide additional services on top of plain connectivity such as content caching, Network Address Translation (NAT), etc. However, ... -
A Security Aware Fuzzy Enhanced ACO Routing Protocol in MANETs
(2018-12-20)As Mobile Ad hoc NETworks (MANETs) grow more popular and are deployed as solutions in various applications such as road safety in Vehicular Ad hoc NETworks (VANETs), wildlife tracking in Wireless Sensor Networks (WSNs) and ... -
On Localization Issues of Mobile Devices
(2018-11-05)Mobile devices, such as sensor nodes, smartphones and smartwatches, are now widely used in many applications. Localization is a highly important topic in wireless networks as well as in many Internet of Things applications. ... -
Automated Provisioning of Fairly Priced Resources
(2018-07-03)In recent times, cloud service providers are increasingly offering more complex services. These complex services are heterogeneous and composed dynamically from traditional services such as IaaS, SaaS, and PaaS to handle ... -
Increasing the robustness of active upper limb prostheses
(2017-02-02)This thesis is based on my work done at the Institute for Neurorehabilitation Systems at the University Medical Center Goettingen. My work has been partially founded by German Ministry for Education and Research (BMBF) via ... -
Secure Routing in Intelligent Device-to-Device Communications
(2016-12-02)Device-to-Device (D2D) communications have received exceptional attention nowadays due to the overabundance number of applications and services. Therefore, D2D is expected to be a vital technical component in Internet of ... -
Triadic Closure and Its Influence in Social Networks
(2016-09-12)Social triad—a group of three people—is one of the simplest and most fundamental social groups, which serves as the basis of social network analysis. Triadic closure, a closing process of an open triad, is a useful ... -
Short-Latency Brain-Computer Interface Using Movement-Related Cortical Potentials
(2016-08-09)In recent years, brain-computer interface (BCI) has been developing as a communication and rehabilitation tool for patients with neurological diseases, such as stroke and spinal cord injury. This system decodes the user's ... -
Efficient Range-Free Monte-Carlo-Localization for Mobile Wireless Sensor Networks
(2015-12-03)A major problem of localization algorithms for Wireless Sensor Networks (WSNs) is the dependence on anchor information. In mobile networks, single node or even whole parts of the network might be temporarily isolated from ... -
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol
(2015-09-11)This dissertation tackles the problem of user privacy and security of transactions in the authentication protocols of the technology of Radio-frequency identification (RFID). Radio-frequency identification is ubiquitously ... -
Distributed Anomaly Detection and Prevention for Virtual Platforms
(2015-07-24)An increasing number of applications are being hosted on cloud based platforms. Cloud platforms are serving as a general computing facility and applications being hosted on these platforms range from simple multi-tier web ...