Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Walid Aljoby"'
Autor:
Walid Aljoby
Our work, DiffPerf, is a key enabler which represents a significant step forward in network softwarization. It supports an agile and dynamic in-network bandwidth allocation in an ISP-centric settings and is implemented on largest community-led SDN pl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ac3b76636b52252d440e4a0e4dadee6
https://doi.org/10.36227/techrxiv.15067863.v1
https://doi.org/10.36227/techrxiv.15067863.v1
Publikováno v:
ICNP
Data communication in cloud-based distributed stream data analytics often involves a collection of parallel and pipelined TCP flows. As the standard TCP congestion control mechanism is designed for achieving "fairness" among competing flows and is ag
Publikováno v:
NetSoft
Continuing the current trend, Internet traffic is expected to grow significantly over the coming years, with video traffic consuming the biggest share. Despite numerous optimizations of the transport congestion control, and the switch butter sizing a
Publikováno v:
ICNP
We consider data intensive cloud-based stream analytics where data transmission through the underlying communication network is the cause of the performance bottleneck. Two key inter-related problems are investigated: task placement and bandwidth all
Publikováno v:
Computer Networks. 71:31-47
In applied wireless multimedia sensor networks, heterogeneous camera nodes with different sensing capabilities are usually deployed due to their role in enhancing the overall network performance and lifetime. Exploiting the correlation characteristic
Autor:
Walid Aljoby, Moad Mowafi
Publikováno v:
International Journal of Image and Data Fusion. 4:293-307
Visual target classification is one of the challenging tasks in resource-constrained wireless sensor networks. This article presents binary and multicast animal classification techniques, which use rule-based decision tree, for wireless multimedia se
Publikováno v:
IET Information Security. 7:67-74
The unique characteristics of the elliptic curve cryptography (ECC) such as the small key size, fast computations and bandwidth saving make its use attractive for multimedia encryption. In this study, the ECC is used to perform encryption along with
Publikováno v:
Communications and Network. :273-279
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome
Publikováno v:
International Journal of Geomate.
The performance of the wireless sensor networks, composed of static sensor nodes, is significantly influenced by the random deployment. Often, the sensors are scattered incorrectly and hence positioned inaccurately. A frequent criticism of the random
Publikováno v:
Bio-inspired Computing – Theories and Applications ISBN: 9789811036101
BIC-TA (1)
BIC-TA (1)
A new metaheuristic, bat algorithm, inspired by echolocation characteristics of micro-bats has been extensively applied to solve various continuous optimization problems. Numerous intelligent techniques are hybridized with bat algorithm to optimize i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f1d399ada8b171a09770a0f291516e46
https://doi.org/10.1007/978-981-10-3611-8_47
https://doi.org/10.1007/978-981-10-3611-8_47