2016 11th International Conference on Computer Engineering & Systems (ICCES)

20-21 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 105
  • Final program

    Publication Year: 2016, Page(s):1 - 32
    Request permission for commercial reuse | PDF file iconPDF (679 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (327 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Welcome message from the conference chair

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • 2016 ICCES Paper Statistics

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • Reviewer statistics

    Publication Year: 2016, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (280 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2016, Page(s):vi - vii
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2016, Page(s):viii - x
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):xi - xvii
    Request permission for commercial reuse | PDF file iconPDF (210 KB)
    Freely Available from IEEE
  • Plenary talk I: Position, location and navigation systems research, innovation, applications, and future vision

    Publication Year: 2016, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • Plenary talk II: Big sensed Data in the Internet of Things

    Publication Year: 2016, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Session PC1: Parallel and cloud computing I

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Automatic cloud's cluster sizing: Controlling cloud service level agreement violation

    Publication Year: 2016, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    Cloud computing creates new business opportunity for small, medium or even large size companies, as it eliminates the need of investing in a huge datacenter in order to operate the environment. The contract between the cloud service provider (CSP) and the lessee is called service level agreement (SLA), which guarantee the quality of service (QoS) that should be fulfilled from the CSP to the lessee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A clustering approach for anonymizing distributed data streams

    Publication Year: 2016, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Privacy preserving data mining have been studied widely on static data. Static algorithms are not suitable for streaming data. This imposes the study of new algorithms for privacy preserving that cope with data streams characteristics. Recently, effective anonymization algorithms have been studied on centralized data streams. In this paper we propose an approach for anonymizing distributed data st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical assessment for security risk and availability in public Cloud frameworks

    Publication Year: 2016, Page(s):17 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    The rapid spread of using Cloud services has become a source of attraction for many business owners due to its multiple potential benefits of flexibility and efficiency with variant pricing plans that can be suited for all types of users. However, there are some vulnerabilities that have important and influential impact on the Cloud Computing efficiency, specially its ability to achieve availabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network-aware resource management strategy in cloud computing environments

    Publication Year: 2016, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (617 KB) | HTML iconHTML

    Efficient network resource sharing in cloud computing environments is a challenging problem. Additionally, network congestion has been reported as a main bottleneck in multi-tenant data centers. In this paper, the problem of virtual machines allocation is tackled based on Software-Defined Network (SDN) resource allocation strategy. Moreover, several important parameters are taken into consideratio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtualization security: A survey

    Publication Year: 2016, Page(s):32 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    Currently cloud computing is the dominant technology capable of addressing the current business demands. However, like all technologies it has threats and vulnerabilities, either from the cloud technology itself or from its enabling technologies. Virtualization is a main driving technology for cloud computing. In this service delivery model, the user has the ability to flexibly create a virtual ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for virtual machine admission control in cloud environment

    Publication Year: 2016, Page(s):41 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Cloud computing is a fast spreading model for service delivery, widely adapted in today's IT environment. It is a combination of other technologies working together, one of them is virtualization, which is the abstraction of computer resources, separating the physical resources from the final resources delivered to the user. Regardless of its wide spread, cloud computing still has security concern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session CN1: Computer networks I

    Publication Year: 2016, Page(s):45 - 46
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Energy-efficient dual-layer MAC protocol with adaptive layer duration for WSNs

    Publication Year: 2016, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (941 KB) | HTML iconHTML

    Energy efficiency is one of the important critical metrics during protocol design in Wireless Sensor Networks (WSNs). Existing Medium Access Control (MAC) protocols do not take the initial node power into consideration, which may result in unfair power consumption, especially for low-power nodes. This paper presents an energy-efficient dual-layer MAC protocol with adaptive layer duration for WSNs.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RGSS-negotiation: A genetic-based approach for web service security negotiation

    Publication Year: 2016, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    RGSS-Negotiation is a Repaired Genetic Security Service Negotiation approach. Security as a non-functional requirement for web service is an important trend. This is due to the different levels of security the consumer and the provider demand or supply. In a web service negotiation, researchers negotiate QoS objects (attributes). Negotiating security levels is not addressed so far. In this paper, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative approach for a MANET Intrusion Detection System using multilateration

    Publication Year: 2016, Page(s):59 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    The use of Mobile ad hoc networking is a growing trend that encompasses a wide spectrum of application domains, including health care, defense, crisis management and others. In common, they all require quick deployment, dynamic communications, and security assurance. Although substantial effort has been put into the security aspect, the results so far have not been enough to claim high levels of i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Four-layer routing protocol with Location based Topology Control of active nodes in WSN

    Publication Year: 2016, Page(s):66 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    In wireless sensor networks (WSNs), efficient use of the nodes' available energy is the main goal which most of the routing protocols seek to achieve. In fact, clustering based routing protocols have gained vast approval due to its merit of less energy exhaustion. The expended energy by one cluster is divided into two main terms, namely, the expended energy in intra-cluster communication (Intra-te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.