With 20 million installs a day [1], third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the
With 20 million installs a day [1], third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the
In this paper a new predictive flow control scheme is proposed and its performance is evaluated. This scheme manages the controllable traffic based on the
Abstract: In transparent computing, the client terminals are rather light-weighted, while all of the resources (including the operating systems, OSs for short) are stored
ABSTRACT Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage
ABSTRACT In Information-Centric Internet of Things (ICIoT), IoT data can be cached throughout a network for close data copy retrievals. Such a distributed data caching
ABSTRACT Traditional routing metrics designed for wireless networks are application-agnostic. In this paper, we consider a wireless network where the application flows consist of video
Abstract: The advancement in computer based accessible systems has opened up many avenues for the visually impaired across a wide majority of the globe. Audio
Abstract: The advancement in computer based accessible systems has opened up many avenues for the visually impaired across a wide majority of the globe. Audio
Project Idea: Developing a web application which makes organizing a big event like University Day of Service easy. A short abstract of the functionalities/ modules
Abstract: Hackathon is a Java web application used for hackthons. In this application the Hackathon conduct code fests. The contestants must be register to participate