Get Latest CSE Projects in your Email

Strategies for Comparing Metabolic Profiles: Implications for the Inference of Biochemical Mechanisms from Metabolomics Data

Large amounts of metabolomics data have been accumulated in recent years and await analysis. Previously we had developed a systems biological approach to infer biochemical mechanisms underlying metabolic alterations observed in Continue reading

An Analysis of Failure-Related Energy Waste in a Large-Scale Cloud Environment

Cloud computing providers are under great pressure to reduce operational costs through improved energy utilization while provisioning dependable service to customers; it is therefore extremely important to Continue reading

Improving the Search Mechanism for Unstructured Peer-to-Peer Networks Using the Statistical Matrix Form

In a traditional file search mechanism, such as flooding, a peer broadcasts a query to its neighbors through an unstructured peer-to-peer (P2P) network until the time-to-live decreases to zero. A major disadvantage of Continue reading

Large Iterative Multitier Ensemble Classifiers for Security of Big Data

This paper introduces and investigates large iterative multitier ensemble (LIME) classifiers specifically tailored for big data. These classifiers are very large, but are quite easy to generate and use. They can be so large that it makes sense to Continue reading

A Scientifically Experimental Approach to the Simulation of Designer Activity in the Conceptual Designing of Software Intensive Systems

The success of designing software intensive systems (SISs) may be improved by incorporating experimentation to be part of the design process. This paper presents a scientific approach to Continue reading

Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds

The vehicular cloud is a promising new paradigm, where vehicular networking and mobile cloud computing are elaborately integrated to enhance the quality of Continue reading

Provable Security for Crypto-Currencies

The past several years have seen the surprising and rapid rise of Bitcoin and other “crypto-currencies.” These are decentralized peer-to-peer networks that allow users to transmit money, to compose financial instruments, and to Continue reading

Efficient Secure Computation for Real-world Settings and Security Models

Secure computation involves multiple parties computing a common function while keeping their inputs private, and is a growing field of cryptography due to its Continue reading