Search
Now showing items 1-20 of 28
Intelligence-driven edge computing for visual cloud computing systems
(University of Missouri--Columbia, 2018)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] The explosive growth and diversity of mobile devices such as smart phones and Internet of Thing (IoT) devices has prompted the evolution of network and ...
Systematic assessment of security, privacy and usability of virtual reality learning environment applications
(University of Missouri--Columbia, 2019)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI--COLUMBIA AT REQUEST OF AUTHOR.] Social Virtual Reality Environments is a new cloud computing based platform which integrates IoT to build applications in areas such as ...
Securing cloud-hosted applications using active defense with rule-based adaptations
(University of Missouri--Columbia, 2021)
Security cloud-based applications is a dynamic problem since modern attacks are always evolving in their sophistication and disruption impact. Active defense is a state-of-the-art paradigm where proactive or reactive ...
ClaimChain: secure Blockchain platform for handling insurance claims processing
(University of Missouri--Columbia, 2021)
Insurance claims processing involves multi-domain entities and multi-source data, along with a number of human-agent interactions. Consequently, this processing is traditionally manually-intensive and time-consuming. ...
Fuzzy-based conversational recommender for data-intensive science gateway applications
(University of Missouri--Columbia, 2018)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT AUTHOR'S REQUEST.] Neuro-scientists are increasingly relying on parallel and distributed computing resources for analysis and visualization of their neuron simulations. ...
Energy-aware mobile edge computing for low-latency visual data processing
(University of Missouri--Columbia, 2017)
New paradigms such as Mobile Edge Computing (MEC) are becoming feasible for use in e.g., real-time decision-making during disaster incident response to handle the data deluge occurring in the network edge. However, MEC ...
Lightweight IoT security middleware for end-to-end cloud-fog communication
(University of Missouri--Columbia, 2017)
IoT (Internet of Things) based smart devices such as sensors and wearables have been actively used in edge clouds i.e., 'fogs' to provide critical data during scenarios ranging from e.g., disaster response to in-home ...
Intelligent user interfaces for internet-of-things based web applications
(University of Missouri--Columbia, 2016)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] There is a growing need for Intelligent User Interfaces to visually make sense of the enormous data that is being created within web applications that ...
Hierarchical cloud-fog platform for data import from network-edge applications
(University of Missouri--Columbia, 2016)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] Communication and coordination in a mass casualty disaster scenario is limited and difficult for medical personnel in the absence of necessary cyber ...
Frequency-minimal utility-maximizing cloud resources allocation for moving target defense
(University of Missouri--Columbia, 2016)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] With the increase of cyber-attacks such as DDoS, intelligent resource-allocation based migration schemes are being devised as counter-strategies to ...
Software-defined measurement to support programmable networking for SoyKB
(University of Missouri--Columbia, 2015)
Campuses are increasingly adopting hybrid cloud architectures for supporting big data science applications that require "on-demand" resources, which are not always available locally on-site. Policies at the campus edge for ...
Dolus : cyber defense using pretense against DDoS attacks in cloud platforms
(University of Missouri--Columbia, 2017)
Cloud-hosted services are being increasingly used in online businesses in e.g., retail, healthcare, manufacturing, entertainment due to benefits such as scalability and reliability. These benefits are fueled by innovations ...
Multi-cloud performance and security driven federated workflow management
(University of Missouri--Columbia, 2016)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] In recent years, most scientific research in both academia and industry has become increasingly data-driven. According to market estimates, spending ...
Portunes Algebra for security formalization in a federated workflow management
(University of Missouri--Columbia, 2016)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] The allocation and dynamic adaptation of federated cyberinfrastructure resources across multiple domains for data-intensive application workflows is ...
"Bring-your-own" plug-in management for next-generation science gateway applications
(University of Missouri--Columbia, 2020)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI-COLUMBIA AT REQUEST OF AUTHOR.] Science gateways are web-portals that hide background complexities of underlying resources and expose easy-to-use capabilities of scientific ...
Location prediction and trajectory optimization in multi-UAV application missions
(University of Missouri--Columbia, 2021)
Unmanned aerial vehicles (a.k.a. drones) have a wide range of applications in e.g., aerial surveillance, mapping, imaging, monitoring, maritime operations, parcel delivery, and disaster response management. Their operations ...
Enhancing network-edge connectivity and computation security in drone video analytics
(University of Missouri--Columbia, 2020)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI--COLUMBIA AT REQUEST OF AUTHOR.] Unmanned Aerial Vehicle (UAV) systems with high-resolution video cameras are used for many operations such as aerial imaging, search and ...
Consortium blockchain management with a peer reputation system for critical information sharing
(University of Missouri--Columbia, 2020)
Blockchain technology based applications are emerging to establish distributed trust amongst organizations who want to share critical information for mutual benefit amongst their peers. There is a growing need for consortium ...
Automated defense against targeted attacks using suspiciousness tracking
(University of Missouri--Columbia, 2021)
Cloud ecosystems, technologies, and paradigms have transformed our world in recent years revolutionizing supply chains, healthcare, energy distribution, as well as our home functions. With everything in our lives so ...
Custom templates based heterogeneous resource allocation for data-intensive applications
(University of Missouri--Columbia, 2020)
[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI-COLUMBIA AT REQUEST OF AUTHOR.] The increase of data-intensive applications in science and engineering fields (i.e., bioinformatics, cybermanufacturing) demand the use of ...