Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Shankar M. Banik"'
Publikováno v:
IEEE Transactions on Services Computing. 15:1045-1058
In this paper, we propose transaction scheduling for web service database transactions. Our solution ensures consistency while preserving efficiency. We propose a prediction-based metric that promotes transactions with reliable reputations based on t
Publikováno v:
DATA
Autor:
Elizabeth Spoehel, Shankar M. Banik
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
Self-driving cars are coming closer and closer to being fact not fiction, but are we ready for them? In this research we analyze the current status in place for self-driving cars. We address the gaps that need to be filled, and we identify the questi
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
Due to increasing number of attacks in the cyberspace that deals with different types of users, it is imperative that an automated responder service will be efficient to help the users detect and mitigate different types of attacks in their systems.
Publikováno v:
2020 International Conference on Computational Science and Computational Intelligence (CSCI).
In this paper, we discuss the importance and proof of concept for a picture-taking app that will remind the user of their surroundings. The background to this issue is that several people die a year because they are in a situation unsafe for taking p
Autor:
Joseph Clark, Shankar M. Banik
Publikováno v:
2020 SoutheastCon.
Malware detection capabilities have grown as the sophistication of the attacks has increased. Usually, signature databases are used to identify malicious files. Due to the growing size of these databases and the constant need for updating, most secur
Publikováno v:
IEEE Transactions on Communications. 66:6329-6338
Collaborative and competitive applications require that participants receive messages almost simultaneously and before a specified time. These requirements have been addressed by the delay variation-bounded multicasting tree (DVBMT) problem. In this
Publikováno v:
2017 International Conference on Computational Science and Computational Intelligence (CSCI).
Ransomware is currently the fastest growing malware attack compromising pertinent data from businesses that leads to loss of sales and trust from future customers. In this paper we provide an analysis of ransomware attacks to determine correlation fa
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 22:1978-1985
Virtual world and other collaborative applications are increasingly becoming popular among Internet users. In such applications, users interact with each other through digital entities or avatars. In order to preserve the user experience, it is impor
Publikováno v:
Journal of Communications and Networks. 13:536-543
The heterogeneous postal delivery model assumes that each intermediate node in the multicasting tree incurs a constant switching time for each message that is sent. We have proposed a new model where we assume a more generalized switching time at int