Gudlavalleru Engineering College

Displaying 1-6 of 6 results

  • White Papers // Oct 2013

    Security in a Virtualised Computing

    Do the security challenges posed by virtualization make it a non-starter for the people sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype - but if it delivers...

    Provided By Gudlavalleru Engineering College

  • White Papers // Oct 2011

    Inferring Web User Sessions by Clustering Techniques

    This paper focuses on the definition and identification of "Web user-sessions", aggregations of several TCP connections generated by the same source host. The identification of a user-session is non trivial. Traditional approaches rely on threshold based mechanisms. However, these techniques are very sensitive to the value chosen for the threshold,...

    Provided By Gudlavalleru Engineering College

  • White Papers // Oct 2011

    Proficient Resource Allocation for Wireless Multicast

    In this paper, the authors propose a bandwidth-efficient multi-cast mechanism for heterogeneous wireless networks. They reduce the bandwidth cost of an l (IP) multi-cast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multi-cast group. Their mechanism enables more mobile hosts to...

    Provided By Gudlavalleru Engineering College

  • White Papers // Sep 2011

    Efficient Item Set Mining Supported by IMine Index

    This paper presents the IMine index, a general and compact structure which provides tight integration of item set extraction in a relational DBMS. Since no constraint is enforced during the index creation phase, IMine provides a complete representation of the original database. To reduce the I/O cost, data accessed together...

    Provided By Gudlavalleru Engineering College

  • White Papers // Sep 2011

    Malicious Packet Losses Detection by Using Compromised Router Detection Protocol

    In this paper, the authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute...

    Provided By Gudlavalleru Engineering College

  • White Papers // Mar 2011

    Noise Reduction Using Mel-Scale Spectral Subtraction With Perceptually Defined Subtraction Parameters-A New Scheme

    The noise signal does not affect uniformly the speech signal over the whole spectrum isn the case of colored noise. In order to deal with speech improvement in such situations a new spectral subtraction algorithm is proposed for reducing colored noise from noise corrupted speech. The spectrum is divided into...

    Provided By Gudlavalleru Engineering College

  • White Papers // Mar 2011

    Noise Reduction Using Mel-Scale Spectral Subtraction With Perceptually Defined Subtraction Parameters-A New Scheme

    The noise signal does not affect uniformly the speech signal over the whole spectrum isn the case of colored noise. In order to deal with speech improvement in such situations a new spectral subtraction algorithm is proposed for reducing colored noise from noise corrupted speech. The spectrum is divided into...

    Provided By Gudlavalleru Engineering College

  • White Papers // Oct 2011

    Inferring Web User Sessions by Clustering Techniques

    This paper focuses on the definition and identification of "Web user-sessions", aggregations of several TCP connections generated by the same source host. The identification of a user-session is non trivial. Traditional approaches rely on threshold based mechanisms. However, these techniques are very sensitive to the value chosen for the threshold,...

    Provided By Gudlavalleru Engineering College

  • White Papers // Oct 2011

    Proficient Resource Allocation for Wireless Multicast

    In this paper, the authors propose a bandwidth-efficient multi-cast mechanism for heterogeneous wireless networks. They reduce the bandwidth cost of an l (IP) multi-cast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multi-cast group. Their mechanism enables more mobile hosts to...

    Provided By Gudlavalleru Engineering College

  • White Papers // Sep 2011

    Efficient Item Set Mining Supported by IMine Index

    This paper presents the IMine index, a general and compact structure which provides tight integration of item set extraction in a relational DBMS. Since no constraint is enforced during the index creation phase, IMine provides a complete representation of the original database. To reduce the I/O cost, data accessed together...

    Provided By Gudlavalleru Engineering College

  • White Papers // Sep 2011

    Malicious Packet Losses Detection by Using Compromised Router Detection Protocol

    In this paper, the authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute...

    Provided By Gudlavalleru Engineering College

  • White Papers // Oct 2013

    Security in a Virtualised Computing

    Do the security challenges posed by virtualization make it a non-starter for the people sensitive business applications? There is much debate about cloud computing, which promises to deliver utility-based virtual computing to the front door of every company. Some are dismissing it as marketing hype - but if it delivers...

    Provided By Gudlavalleru Engineering College