Related papers
Green Technology, Cloud Computing and Data Centers: the Need for Integrated Energy Efficiency Framework and Effective Metric
Nader Nada
View PDFchevron_right
Precise fingerprint enrolment through projection incorporated subspace based on Principal Component Analysis (PCA)
Dr. Md. Rajibul Islam
2007
View PDFchevron_right
Journal of Computer Science IJCSIS May 2016 Part II
Journal of Computer Science IJCSIS
It is our great pleasure to present the May 2016 issue PART 2 (Volume 14 Number 5 Part 2) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in the field, promoting insight and understanding of the state of the art, and trends in computer science and technology. It especially provides a platform for high-caliber academics, practitioners and PhD/Doctoral graduates to publish completed work and latest research outcomes. According to Google Scholar, up to now papers published in IJCSIS have been cited over 6389 times and the number is quickly increasing. This statistics shows that IJCSIS has established the first step to be an international and prestigious journal in the field of Computer Science and Information Security. There have been many improvements to the processing of papers; we have also witnessed a significant growth in interest through a higher number of submissions as well as through the breadth and quality of those submissions. IJCSIS is indexed in major academic/scientific databases and important repositories, such as: Google Scholar, Thomson Reuters, ArXiv, CiteSeerX, Cornell’s University Library, Ei Compendex, ISI Scopus, DBLP, DOAJ, ProQuest, ResearchGate, Academia.edu and EBSCO among others. On behalf of IJCSIS community and the sponsors, we congratulate the authors and thank the reviewers for their outstanding efforts to review and recommend high quality papers for publication. In particular, we would like to thank the international academia and researchers for continued support by citing papers published in IJCSIS. Without their sustained and unselfish commitments, IJCSIS would not have achieved its current premier status. “We support researchers to succeed by providing high visibility & impact value, prestige and excellence in research publication.” For further questions or other suggestions please do not hesitate to contact us at ijcsiseditor@gmail.com. A complete list of journals can be found at: http://sites.google.com/site/ijcsis/ IJCSIS Vol. 14, No. 5, May 2016 Edition ISSN 1947-5500 © IJCSIS, USA.
View PDFchevron_right
Cloud Computing and Security
VK VK
APPS, 1999
View PDFchevron_right
Journal of Computer Science and Information Security June 2011
Kifayat Ullah Khan, Mst Selvi, Abd Jemai, Dewi Agushinta R., Amjad Ali, Adekunle Yinka, Journal of Computer Science IJCSIS
Journal of Computer Science and Information Security (IJCSIS ISSN 1947-5500) is an open access, international, peer-reviewed, scholarly journal with a focused aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of Computing and Information Security. The journal is published monthly, and articles are accepted for review on a continual basis. Papers that can provide both theoretical analysis, along with carefully designed computational experiments, are particularly welcome. IJCSIS editorial board consists of several internationally recognized experts and guest editors. Wide circulation is assured because libraries and individuals, worldwide, subscribe and reference to IJCSIS. The Journal has grown rapidly to its currently level of over 1,100 articles published and indexed; with distribution to librarians, universities, research centers, researchers in computing, and computer scientists. Other field coverage includes: security infrastructures, network security: Internet security, content protection, cryptography, steganography and formal methods in information security; multimedia systems, software, information systems, intelligent systems, web services, data mining, wireless communication, networking and technologies, innovation technology and management. https://sites.google.com/site/ijcsis/
View PDFchevron_right
A SET OF SCALAR FEATURES REPRESENTATION FOR 3D FACE RECOGNITION
Fatimah Khalid
T1 Artificial Intelligence …, 2007
View PDFchevron_right
An Ontology Based Meta-Search Engine for Effective Web Page Retrieval
P. Vijaya
In virtualized environments, accurate metering the power consumption of individual virtual machine (VM) is a challenging issue. Conventional VM power metering techniques rely on the assumption that the power consumption is linear to the utilization of hardware utilization. However, such a utilization-based technique can only provide coarse-grained power measurement with unbounded error. In this paper, we firstly formulize the relationship between the resource utilization and the accuracy of power metering. Then, we proposed a novel VM scheduling algorithm, which uses the information of performance monitoring counters (PMC) to compensate the recursive power consumption. Theoretical analysis indicates that the proposed algorithm can provide bounded error when metering per-VM power consumption. Massive experiments are conducted by using various benchmarks on different platforms, and the results shown the error of per-VM power metering can be limited below 5.2%. Nomenclature U j Utilization of components j vm i P Dynamic power consumption of VM i W i
View PDFchevron_right
Emerging Database Research in East Europe
Bernhard Thalheim
View PDFchevron_right
Tool Support for Competency Evaluation of Web-Ontologies
Noor Teo
2007
Ontology is a key component of the semantic web. The web ontologies facilitate users to espouse a common understanding of the structure of knowledge in an application domain, enabling sharing of knowledge meaningfully on the web. The increasing use of the semantic web has escalated the demand for ‘competent’ ontologies, i.e., ontologies that can effectively support their purpose of use. Hence, we regard competency as an important quality that must be assessed when evaluating ontologies being built or adapted. The competency evaluation is a semantic analysis performed by a user to ascertain if the existing ontological commitments are adequate to support the ontology’s needs and requirements. The detail analysis inevitably needs to inspect the concepts defined in the ontology and trace the relationships that exist between them. Evaluating ontologies in this manner is a challenging task because it is cumbersome to trace the intricate conceptual relationships from within the ontol...
View PDFchevron_right
Attacking the Web Cancer with the Automatic Understanding Approach
Waldemar W Koczkodaj, Krzysztof Kielan, Kalpdrum Passi, Ryszard Tadeusiewicz
Advances in Soft Computing, 2007
View PDFchevron_right