Search Results - "2013 11th RoEduNet International Conference"

Refine Results
  1. 1

    A big data implementation based on Grid computing by Garlasu, D., Sandulescu, V., Halcu, I., Neculoiu, G., Grigoriu, O., Marinescu, M., Marinescu, V.

    “…Big Data is a term defining data that has three main characteristics. First, it involves a great volume of data. Second, the data cannot be structured into…”
    Get full text
    Conference Proceeding
  2. 2

    Simulations framework for network congestion avoidance algorithms using the OMNeT++ IDE by Buzura, S., Dadarlat, V., Peculea, A., Iancu, B., Cebuc, E.

    “…This paper presents a new approach for developing network congestion avoidance simulations using the OMNeT++ IDE. Two active queue management and congestion…”
    Get full text
    Conference Proceeding
  3. 3

    Converting unstructured and semi-structured data into knowledge by Rusu, O., Halcu, I., Grigoriu, O., Neculoiu, G., Sandulescu, V., Marinescu, M., Marinescu, V.

    “…With the rapid growth in number and dimension of databases and database applications in business, administrative, industrial and other fields, it is necessary…”
    Get full text
    Conference Proceeding
  4. 4

    A security framework for mobile cloud applications by Popa, D., Cremene, M., Borda, M., Boudaoud, K.

    “…Mobile Cloud Computing is a new concept, which offers Cloud resources and services for mobile devices. It also brings several advantages to mobile devices and…”
    Get full text
    Conference Proceeding
  5. 5

    A marker-based augmented reality system for mobile devices by Gherghina, Alexandru, Olteanu, A., Tapus, N.

    “…Given the rate at which mobile devices are adopted by the general public, we are at a point where many of us own a smart phone. Currently, this makes them the…”
    Get full text
    Conference Proceeding
  6. 6

    A SLA-based method for big-data transfers with multi-criteria optimization constraints for IaaS by Nita, M-C, Chilipirea, C., Dobre, C., Pop, F.

    “…When one pays for a Cloud Service he wants the Service to be compliant with standards and to respect his needs (respect the Service Level Agreement). When…”
    Get full text
    Conference Proceeding
  7. 7

    Security and complexity of a DNA-based cipher by Tornea, O., Borda, M. E.

    “…DNA cryptography is a new and promising field in information security. It combines the classical solutions in cryptography with the strength of the genetic…”
    Get full text
    Conference Proceeding
  8. 8

    Toward the selection of an enterprise architecture model for a cloud environment by Zota, Razvan Daniel, Fratila, A.

    “…Year 2012 celebrates the 25 th anniversary of Enterprise Architecture (EA) field, since in 1987 J.A. Zachman wrote an article entitled "A Framework for…”
    Get full text
    Conference Proceeding
  9. 9

    Energy-efficient and fault tolerant methods for message delivery in Internet of Things by Pop, F., Bessis, N.

    “…The Internet of Things is an emerging paradigm shaping our current understanding about the future of Internet. Most of today's inter-enterprise applications…”
    Get full text
    Conference Proceeding
  10. 10

    Easy attendance: location-based authentication for students integrated with moodle by Bucicoiu, M., Tapus, N.

    “…Nowadays, the e-learning platforms have become intensively used. Most schools and universities use a register in order to keep track of pupils and students'…”
    Get full text
    Conference Proceeding
  11. 11

    Fault tolerant surveillance system based on a network of mobile devices by Fasui, A. A., Olteanu, A., Tapus, N.

    “…According to Maslow's hierarchy of needs, personal security plays an important role in everyone's life. Thus, over the years, surveillance systems have…”
    Get full text
    Conference Proceeding
  12. 12

    Qualitative analysis of differential privacy applied over graph structures by Costea, S., Barbu, M., Rughinis, R.

    “…The increase in popularity of online services has generated interest in developing new algorithms to better protect user privacy. Some services defend…”
    Get full text
    Conference Proceeding
  13. 13

    Performance evaluation of topology control algorithms that can be integrated into a street lighting control sensor network by Alexandru, L., Valentin, P.

    “…This paper presents the performance evaluation of the topology control algorithms that can be integrated in a street lighting monitoring and control system…”
    Get full text
    Conference Proceeding
  14. 14

    Adaptive query algorithm for location oriented applications by Rizea, Daniel-Octavian, Tudose, D., Olteanu, A., Tapus, N.

    “…The Internet of Things and Ubiquitous Computing are becoming more and more popular in the IT world. There are increasingly more heterogeneous systems of…”
    Get full text
    Conference Proceeding
  15. 15

    Extended control-value emotional agent based on fuzzy logic approach by Moga, H., Sandu, F., Danciu, G. M., Boboc, R., Constantinescu, I.

    “…The goal of our research was the implementation of a new emotional agent based on the control-value theory in psycho-pedagogy. This new type of emotional agent…”
    Get full text
    Conference Proceeding
  16. 16

    Analysis of VoIP encryption performance using dedicated hardware by Cioponea, C., Bucicoiu, M., Rosner, D.

    “…Voice over Internet Protocol benefits of the existing Internet infrastructure, but also has to fight Internet security threats. Along with the Internet growth,…”
    Get full text
    Conference Proceeding
  17. 17

    Nagios-based network management for Android, Windows and Fedora Core terminals using Net-SNMP agents by Magda, Stefan Mihail, Rus, A. B., Dobrota, V.

    “…The paper is focused on Nagios, an open-source flexible monitoring tool for enterprises. The goal was to add new objects (i.e. QoS parameters) in a management…”
    Get full text
    Conference Proceeding
  18. 18

    Current status of the wireless local area networks in Romania by Ionescu, Valeriu, Smaranda, F., Sima, I., Diaconu, A.

    “…This paper presents a study concerning the current implementation of 802.11 wireless local area networks in Romania and their security. The data that was…”
    Get full text
    Conference Proceeding
  19. 19

    Collaborative learning assistant for Android by Zamfirache, V., Olteanu, A., Tapus, N.

    “…The quantitative and qualitative increase in mobile devices that reach the average user opens more and more topics for research. In education, m-Learning has…”
    Get full text
    Conference Proceeding
  20. 20

    Networking architectures for healthcare wireless sensor networks comparison of architectures used for remote patient monitoring by Poenaru, E., Poenaru, C.

    “…During the last decade, the national health systems faced tremendous pressure coming from two main factors: an increased number of patients and the necessity…”
    Get full text
    Conference Proceeding