Volume 3, Issue 2, April 2015
Pages: 69 - 78
In Vehicular Ad-hoc Networks, security is a important issue. In the past years, several approaches have been
proposed for solving Sybil attack. In this paper a novel scheme to detect the Sybil nodes is presented. The proposed
scheme utilizes unmodifiable physical measurements of beacon messages. To...
Pages: 79 - 88
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations
for the purpose of the efficient processing of query against the results of applying the transformations to time
series. In this paper, the moving average is used as a transformation for...
Pages: 89 - 98
This paper proposes a parallel indexing scheme of a large amount of data in order to resolve the issues about time
limitation. Three kinds of computing-nodes are introduced. These are reception-nodes, representative-nodes, and
normal-nodes. A reception-node receives data for insertion. A representative-node...
Pages: 99 - 108
Live migration enables administrators to perform online maintenance on host and virtual machines without
interrupted service during fault occurrences. While migrating VMs between physical servers of different data
centers over the network is considered, security is essential for securing the migration...
Pages: 109 - 118
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user’s...
Pages: 119 - 127
In this paper, an incremental data migration technique is evaluated in the multi-database system based on MySQL
with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this
systems. In this method, a large data migration is divided into small data migrations...
Pages: 128 - 136
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This
requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect
privacy of current and new owner. Many ownership tag ownership transfer exists...