DIP-Java
Fuzzy Random Impulse Noise Removal From Color Image Sequences
A new fuzzy filter is presented for the noise reduction of images corrupted with additive noise. The..
Game Based Analysis of Distributed DoS Attacks Prevention Using Puzzle-Based Defense Strategy
Availability of services in a Grid Computing system is a security concerned that has received enormo..
Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOS Environments
Positioning in wireless networks is today mainly used for yellow page services. Yet, its importance ..
GIVE 2 GET FORWARDING IN SOCIAL MOBILE WIRELESS N/W OF SELFISH NODES
In this paper, we present two forwarding protocols for mobile wireless networks of selfish individua..
Group Key Agreement with Local Connectivity
In this paper, we study a group key agreement problem where a user is only aware of his neighbors wh..
Growing Grapes in Your Computer to DefendAgainst Malware
the aspect of malware, since some sophisticated malware that can bypass the signature detectio..
Guaranteed Packet Delivery Using Greedy Routing
Ad hoc network is an autonomous system that does not require a pre-established infrastructure. Nodes..
heap graph based software theft detection
As JavaScript is becoming more and more popular, JavaScript programs are valuable assets to many co..
Heterogeneous web service selection from ontology repository using adaptive service selection algorithm
By these days, most companies are more aware of than ever in providing quality of services over the ..
Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
Semantic Web is an emerging area to augment human reasoning. Various technologies are being develope..
HFSP Bringing Size-Based Scheduling To Hadoop
Size-based scheduling with aging has been recognized as an effective approach to guarantee fairness ..
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection
Abstract—We propose a highly scalable cluster-based hierarchical trust management protocol for wirel..
High Performance and High Scalable Packet Classification Algorithm for Network Security Systems
Packet classification is a core function in network and security systems; hence, hardware-based solu..
High throughput and memory efficient mutlimatch packet classification
XML is commonly supported by SQL database systems. However, existing mappings of XML to tables can o..
HireSome-II Towards Privacy-Aware CrossCloud Service Composition for Big Data Applications
Cloud computing promises a scalable infrastructure for processing big data applications such as medi..