Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Julia Deng"'
Autor:
Lloyd D. Harvey, Yan Yin, Insiya Y. Attarwala, Gulnaz Begum, Julia Deng, Hong Q. Yan, C. Edward Dixon, Dandan Sun
Publikováno v:
ASN Neuro, Vol 7 (2015)
We investigated the effects of the administration of docosahexaenoic acid (DHA) post-traumatic brain injury (TBI) on reducing neuroinflammation. TBI was induced by cortical contusion injury in Sprague Dawley rats. Either DHA (16 mg/kg in dimethyl sul
Externí odkaz:
https://doaj.org/article/cd93820fbd92492687eb460537fca915
Autor:
Onur Savas, Julia Deng
Big data is presenting challenges to cybersecurity. For an example, the Internet of Things (IoT) will reportedly soon generate a staggering 400 zettabytes (ZB) of data a year. Self-driving cars are predicted to churn out 4000 GB of data per hour of d
Publikováno v:
Big Data Analytics in Cybersecurity ISBN: 9781315154374
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1f2fd91b20e7f47511cb0611981f24c2
https://doi.org/10.1201/9781315154374-2
https://doi.org/10.1201/9781315154374-2
Autor:
Julia Deng, Onur Savas
Publikováno v:
Big Data Analytics in Cybersecurity ISBN: 9781315154374
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba7d51edcf46cdc0919b8e1bc4c7470b
https://doi.org/10.1201/9781315154374-14
https://doi.org/10.1201/9781315154374-14
Autor:
Jason Li, Justin Yackoski, Julia Deng, Yalin E. Sagduyu, Kyung Joon Kwak, Babak Azimi-Sadjadi, Ali Namazi
Publikováno v:
IEEE Communications Magazine. 52:30-36
The future AN is envisioned as an IP-based hierarchical network with heterogeneous nodes and waveforms. Due to its highly dynamic nature and bandwidth constraints, new AN technologies are needed to provide reliable network operations with similar lev
Publikováno v:
ACM SIGMETRICS Performance Evaluation Review. 41:86-89
We discuss tactical challenges of the Big Data analytics regarding the underlying data, application space, and com- puting environment, and present a comprehensive solution framework motivated by the relevant tactical use cases. First, we summarize t
Publikováno v:
MILCOM
In ongoing efforts, our team has developed DISCO (Distributed Cross-layer Architecture for Network Awareness and Opportunistic Transport), a cross-layer framework to enable network awareness and automated adaptation of transport, network and applicat
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 9:184-197
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the
Publikováno v:
Pervasive and Mobile Computing. 7:509-522
Wireless sensor networks (WSNs) are prone to failures and malicious attacks. Traditional approaches from encryption and authentication are not sufficient to solve the problems. Trust management of WSNs is bringing new approaches. However, it is still
Publikováno v:
MDM (1)
The increasing popularity of smart mobile devices enables a widespread use of Location Based Services (LBS). LBSs require real-time processing of frequent updating data (i.e., Streams), and return customized results to mobile users based on their own