Search Word(s) in Title, Keywords, Authors, and Abstract: Availability

Security and Privacy in Ubiquitous Sensor Networks
Alfredo J. Perez, Sherali Zeadally and Nafaa Jabeur
Page: 286~308, Vol. 14, No.2, 2018
10.3745/JIPS.03.0094

Keywords: Human-Centric Sensing, Internet of Things, Opportunistic Sensing, Participatory Sensing, Privacy, Security, Ubiquitous Sensing
Show / Hide Abstract

Dynamic Cloud Resource Reservation Model Based on Trust
Jiao-Hong Qiang, Ding-Wan Ning, Tian-Jun Feng and Li-Wei Ping
Page: 377~398, Vol. 14, No.2, 2018
10.3745/JIPS.03.0091

Keywords: Cloud-Domain-Based Management Architecture, Decision of Candidate Resources, Dynamic Resource Reservation, Two-Way Trust Evaluation Mechanism
Show / Hide Abstract

Transaction Processing Method for NoSQL Based Column
Jeong-Joon Kim
Page: 1575~1584, Vol. 13, No.6, 2017
10.3745/JIPS.04.0052

Keywords: Bigdata, HBase, Multi-Row Transaction, NoSQL
Show / Hide Abstract

Resilient Packet Transmission (RPT) for Buffer Based Routing (BBR) Protocol
Geetanjali Rathee and Nitin Rakesh
Page: 57~72, Vol. 12, No.1, 2016
10.3745/JIPS.03.0014

Keywords: WMN, Resiliency, BBR, Routing, RPT
Show / Hide Abstract

Penetration Testing and Network Auditing: Linux
Deris Stiawan, Mohd. Yazid Idris and Abdul Hanan Abdullah
Page: 104~115, Vol. 11, No.1, 2015
10.3745/JIPS.03.0013

Keywords: Network attack, network auditing, network forensic
Show / Hide Abstract

Performance Comparison of HEVC and H.264/AVC Standards in Broadcasting Environments
Maheshi B. Dissanayake and Dilanga L. B. Abeyrathna
Page: 483~494, Vol. 11, No.3, 2015
10.3745/JIPS.03.0036

Keywords: Complexity, Compression Efficiency, HEVC, H.264/AVC, Latency
Show / Hide Abstract

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
Gran Badshah, Siau-Chuin Liew, Jasni Mohamad Zain and Mushtaq Ali
Page: 601~615, Vol. 11, No.4, 2015
10.3745/JIPS.03.0044

Keywords: Lossless Recovery, Tamper Localization, Telemedicine, Watermarking, Whole Image, WITALLOR
Show / Hide Abstract

Prioritized Multipath Video Forwarding in WSN
Syed Muhammad Asad Zaidi, Jieun Jung and Byunghun Song
Page: 176~192, Vol. 10, No.2, 2014
10.3745/JIPS.03.0002
Keywords: WMSN, H.264, Multiple Paths, Quality of Service
Show / Hide Abstract

An Analysis of Replication Enhancement for a High Availability Cluster
Sehoon Park, Im Y. Jung, Heonsang Eom and Heon Y. Yeom
Page: 205~216, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.205
Keywords: High-Availability Cluster, Replication Enhancement, SRM, DRBD
Show / Hide Abstract

Developing a Web-Based Knowledge Product Outsourcing System at a University
Mark B. Onte and Dave E. Marcial
Page: 548~566, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.548
Keywords: Knowledge Product Outsourcing, Management, Web 2.0, IT in Education
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.263
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances
Ivy Ong and Hyotaek Lim
Page: 53~62, Vol. 7, No.1, 2011
10.3745/JIPS.2011.7.1.053
Keywords: iATA Protocol, Load Balancing, Network Monitoring, Storage Network Solution, Write Replication
Show / Hide Abstract

Implementation of Advanced IP Network Technology for IPTV Service
Young-Do Joo
Page: 25~32, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.025
Keywords: IPTV, Premium Backbone, QoS, Multicast, High Availability, Security
Show / Hide Abstract

Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics
Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee and Yoon Sok Park
Page: 33~40, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.033
Keywords: Worm, Random Constant Spreading, Dynamic Network, Depth Distribution Characteristic, Bandwidth Control
Show / Hide Abstract

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster
Junaid Ahsenali Chaudhry
Page: 69~76, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.069
Keywords: Self Healing Systems, Load Estimation and Balancing, OKKAM, Entity Naming System
Show / Hide Abstract

A Study on RFID System with Secure Service Availability for Ubiquitous Computing
Dae-Hee Seo and Im-Yeong Lee
Page: 96~101, Vol. 1, No.1, 2005
None
Keywords: RFID, Service Availability, Secure Communication, Network Management Ubiquitous Computing
Show / Hide Abstract