An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

projects 2012 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks- projects 2012 projects 2012, Networking , February 2012 A distributed adaptive opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is shown to be optimal with respect to an expected average per packet reward criterion. The proposed routing scheme jointly addresses the issues of learning and routing in an opportunistic…

Read More

Bootstrapping Ontologies for Web Services

projects 2012 Bootstrapping Ontologies for Web Services – projects 2012 projects 2012, Services Computing,  Jan.-March 2012 Ontologies have become the de-facto modeling tool of choice, employed in many applications and prominently in the semantic web. Nevertheless, ontology construction remains a daunting task. Ontological bootstrapping, which aims at automatically generating concepts and their relations in a given domain, is a promising technique for ontology construction. Bootstrapping an ontology based on a set of predefined textual sources, such as web services, must address the problem of multiple, largely unrelated concepts. In this…

Read More

Detecting and Resolving Firewall Policy Anomalies

projects 2012 Detecting and Resolving Firewall Policy Anomalies – projects 2012 projects 2012, Dependable and Secure Computing, May-June 2012 The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most businesses and institutions. The effectiveness of security protection provided by a firewall mainly depends on the…

Read More

Risk-Aware Mitigation for MANET Routing Attacks

projects 2012 Risk-Aware Mitigation for MANET Routing Attacks– projects 2012 projects 2012, Dependable and Secure Computing, March – April 2012 Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exists several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naïve fuzzy response decisions. However, binary…

Read More

Outsourced Similarity Search on Metric Data Assets

projects 2012 Outsourced Similarity Search on Metric Data Assets – projects 2012 projects 2012, Knowledge And Data Engineering,  February 2012 This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users, not to the service provider or anyone else. Users query the server for the most similar data objects to a query example. Outsourcing offers the data owner scalability and a low-initial investment. The need for privacy may be due to…

Read More