top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
18th International Conference on Advanced Information Networking and Applications : proceedings : AINA 2004, 29-31 March, 2004, Fukuoka, Japan
18th International Conference on Advanced Information Networking and Applications : proceedings : AINA 2004, 29-31 March, 2004, Fukuoka, Japan
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2004
Disciplina 004.6
Soggetto topico Computer networks
Information networks
Telecommunications
Electrical & Computer Engineering
Engineering & Applied Sciences
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996214788203316
[Place of publication not identified], : IEEE, 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
18th International Conference on Advanced Information Networking and Applications : proceedings : AINA 2004, 29-31 March, 2004, Fukuoka, Japan
18th International Conference on Advanced Information Networking and Applications : proceedings : AINA 2004, 29-31 March, 2004, Fukuoka, Japan
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2004
Disciplina 004.6
Soggetto topico Computer networks
Information networks
Telecommunications
Electrical & Computer Engineering
Engineering & Applied Sciences
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910872567703321
[Place of publication not identified], : IEEE, 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems : 3-5 July, 2013, Asia University, Taichung, Taiwan / / Institute of Electrical and Electronics Engineers ; edited by, Leonard Barolli [and four others]
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems : 3-5 July, 2013, Asia University, Taichung, Taiwan / / Institute of Electrical and Electronics Engineers ; edited by, Leonard Barolli [and four others]
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013
Descrizione fisica 1 online resource (179 pages)
Disciplina 003
Soggetto topico System theory
Computer networks
Software engineering
ISBN 1-4799-0547-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910132912003321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems : 3-5 July, 2013, Asia University, Taichung, Taiwan / / Institute of Electrical and Electronics Engineers ; edited by, Leonard Barolli [and four others]
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems : 3-5 July, 2013, Asia University, Taichung, Taiwan / / Institute of Electrical and Electronics Engineers ; edited by, Leonard Barolli [and four others]
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013
Descrizione fisica 1 online resource (179 pages)
Disciplina 003
Soggetto topico System theory
Computer networks
Software engineering
ISBN 1-4799-0547-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996280011603316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2013
Descrizione fisica 1 online resource (cxv, 1658 pages) : illustrations
Disciplina 004.6
Soggetto topico Information networks
ISBN 0-7695-4952-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996279729903316
[Place of publication not identified], : IEEE, 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2013
Descrizione fisica 1 online resource (cxv, 1658 pages) : illustrations
Disciplina 004.6
Soggetto topico Information networks
ISBN 0-7695-4952-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910133740803321
[Place of publication not identified], : IEEE, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 1 / / edited by Leonard Barolli
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 1 / / edited by Leonard Barolli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XXIX, 577 p. 249 illus., 188 illus. in color.)
Disciplina 620.00285
Collana Lecture Notes in Networks and Systems
Soggetto topico Engineering—Data processing
Computational intelligence
Artificial intelligence
Data Engineering
Computational Intelligence
Artificial Intelligence
ISBN 3-031-29056-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910682552103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced information networking and applications . Volume 2. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli
Advanced information networking and applications . Volume 2. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (601 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Computer networks
Information networks
ISBN 9783031284519
9783031284502
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from AINA-2023 Organizers -- Organization -- AINA-2023 Keynote Talks -- Blockchain and IoT Integration: Challenges and Future Directions -- Toward Sustainable, Intelligent, Secure, Fully Programmable, and Multisensory (SENSUOUS) Networks -- Contents -- Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments -- 1 Introduction -- 2 Background -- 2.1 Blockchain -- 2.2 Consensus Mechanisms -- 3 Integration of Consensus Algorithms and Evaluations -- 3.1 Integrations -- 3.2 Evaluation -- 4 Related Work -- 5 Conclusions and Future Work -- References -- Nexus: Proxy Service for the Web of Things -- 1 Introduction -- 2 Background and Related Work -- 3 Design and Architecture -- 3.1 Nexus Architecture -- 3.2 Front-End -- 3.3 Security -- 3.4 IoT Management -- 3.5 Directory -- 3.6 Publication and Subscription -- 4 Evaluation -- 5 Conclusions and Future Work -- References -- ABIDI: A Reference Architecture for Reliable Industrial Internet of Things -- 1 Introduction -- 2 The ABIDI Framework -- 3 A Building Management Use Case -- 4 Key Research Challenges -- 5 Conclusions -- References -- DASA: An Efficient Data Aggregation Algorithm for LoRa Enabled Fog Layer in Smart Agriculture*-4pt -- 1 Introduction -- 2 Related Work -- 3 Proposed Communication Framework -- 4 DASA: Proposed Data Aggregation Algorithm -- 5 Performance Evaluation -- 6 Conclusions and Future Work -- References -- FSET: Fast Structure Embedding Technique for Self-reconfigurable Modular Robotic Systems -- 1 Introduction -- 2 Related Work -- 3 FSET Technique -- 3.1 Recall of SET Algorithm -- 3.2 FSET: Fast SET Algorithm -- 4 Simulation and Results -- 4.1 Execution Time -- 4.2 Iteration Loop -- 4.3 Energy Consumption -- 5 Conclusion and Future Work -- References -- A Blockchain Based Authentication Mechanism for IoT in Agriculture 4.0.
1 Introduction -- 2 Literature Review -- 2.1 IoT Vulnerabilities and Threats in Agriculture 4.0 -- 2.2 Blockchain Technology -- 2.3 Blockchain Solutions in IoT Agriculture -- 3 Proposed Architecture -- 3.1 Iot Devices -- 3.2 Edge Gateway -- 3.3 Blockchain for Authentication -- 4 Conclusion -- References -- Performance Evaluation of FC-RDVM and LDIWM Router Placement Methods for WMNs by WMN-PSODGA Hybrid Simulation System Considering Load Balancing and Chi-Square Distribution of Mesh Clients -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Description of WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Uncertainty Handling with Type-2 Interval-Valued Fuzzy Logic in IoT Resource Classification -- 1 Introduction -- 2 EXEHDA-RR: Software Architecture -- 3 EXEHDA-RR Proposal Validation -- 4 Related Works -- 5 Conclusions -- References -- An Analysis of Representative Works of Japanese Literature Based on Emotions and Topics -- 1 Introduction -- 2 Analytical Techniques -- 2.1 Heat -- 2.2 TBAT -- 3 Analysis of Literary Works Based on Emotions -- 3.1 Target Literary Works -- 3.2 Emotional Analysis Results -- 4 Analysis of Literary Works Based on Topics -- 5 Conclusion -- References -- Analysis and Comparison of Machine Learning Models for Glucose Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 Forecasting Strategies -- 2.2 Forecasting Models -- 2.3 Walk-Forward Evaluation -- 3 Experiments -- 3.1 Data and Pre-processing -- 3.2 Results -- 4 Conclusions -- References -- On Enhancing Network Slicing Life-Cycle Through an AI-Native Orchestration Architecture -- 1 Introduction -- 2 Related Work -- 3 SFI2 AI-Native Architecture -- 4 Experimental Setup -- 5 Results and Discussion.
6 Concluding Remarks -- References -- Adaptive Inference on Reconfigurable SmartNICs for Traffic Classification -- 1 Introduction -- 2 Background and Related Work -- 3 Framework -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- eDeepRFID-IPS: Enhanced RFID Indoor Positioning with Deep Learning for Internet of Things -- 1 Introduction -- 2 Related Work -- 3 The proposed eDeepRFID-IPS System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Model for Artificial Conscience to Control Artificial Intelligence -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need to Control AI -- 2.2 Artificial Conscience and Controlling AI -- 2.3 Role of Trust -- 3 Trust Based Artificial Conscience - A Control Module for AI Systems -- 3.1 Trust Engine -- 3.2 Trust Pressure and Trust Sensitivity -- 3.3 Artificial Conscience - Control Module -- 4 Implementation -- 4.1 Data -- 4.2 Experimentation Setup and Results -- 5 Conclusion -- References -- A Vulnerability Risk Assessment Methodology Using Active Learning -- 1 Introduction -- 2 Related Work -- 3 Proposal and Methodology -- 3.1 ML-Based Risk Assessment -- 3.2 The Dataset -- 3.3 The Vulnerability Risk Labels -- 3.4 Labeling Strategy via Active Learning -- 3.5 Learning Strategy -- 4 Results -- 4.1 Experiments -- 4.2 Data Preprocessing and Evaluation Metrics -- 4.3 Discussion of Results -- 5 Conclusion and Future Work -- References -- A Fuzzy Inference and Posture Detection Based Soldering Motion Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Experimental Results -- 4 Conclusions -- References -- An Anomaly Detection System for Intelligent Robot Vision Using LSTM -- 1 Introduction -- 2 Proposed System -- 2.1 Anomaly Detection for Robot Vision -- 2.2 Visualization and Danger Notification for Robot Arm -- 3 Experimental Results -- 4 Conclusions -- References.
GDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 The GDLS-FS Architecture -- 5 Proof-of-Concept: Implementation -- 6 Experiments and Results -- 6.1 Neighborhood Structure Microservices -- 6.2 Local Search Microservices -- 7 Conclusion -- References -- Multi-agent Deep Q-Learning Based Navigation -- 1 Introduction -- 2 Related Work -- 3 Preliminary Concepts -- 3.1 Q-Learning -- 3.2 Deep Q-Learning -- 4 Distributed Multi-agent Deep Q-learning Algorithm -- 4.1 Description of the Algorithm -- 5 Implementation and Results -- 6 Conclusion -- References -- Identifying Network Congestion on SDN-Based Data Centers with Supervised Classification*-6pt -- 1 Introduction -- 2 Motivation and Problem Definition -- 2.1 Congestion Control and Avoidance in SDN Data Centers -- 2.2 Related Work -- 3 Design and Implementation -- 3.1 Data Monitoring and Adjustments -- 3.2 Generating Classification Labels and Training the Models -- 4 Experimental Analysis -- 4.1 Metrics and Scenarios -- 4.2 Control Traffic -- 4.3 Results and Discussions -- 5 Conclusion -- References -- Detection of Malicious Sites Using Graph Machine Learning -- 1 Introduction -- 2 Preliminaries -- 3 Related Works -- 4 Our Proposal -- 5 Results and Discussions -- 6 Conclusion and Future Works -- References -- Bonet Detection Mechanism Using Graph Neural Network -- 1 Introduction -- 2 Background and Related Work -- 2.1 Activity and Event Network Model -- 2.2 Related Work -- 3 Proposed Graph Network Model -- 4 Experiments and Results -- 4.1 Datasets -- 4.2 Performance Metrics -- 4.3 Considered Scenarios and Results -- 5 Conclusion -- References -- Object Placement Algorithm with Information Flow Control in Fog Computing Model -- 1 Introduction -- 2 System Model.
2.1 CBAC (Capability-Based Access Control) Model -- 2.2 FC (Fog Computing) Model -- 2.3 Information Flow Relations -- 3 Object Placement Algorithm -- 4 Information Flow Control in the FC Model -- 5 Concluding Remarks -- References -- An Energy-Aware Algorithm for Changing Tree Structure and Process Migration in the Flexible Tree-Based Fog Computing Model -- 1 Introduction -- 2 The TBFC Model -- 2.1 Tree Structure of Nodes -- 2.2 Power Consumption and Computation Models -- 3 The FTBFC Model -- 3.1 Operations on the FTBFC Model -- 3.2 Flexible Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- SANKMO: An Approach for Ingestion, Processing, Storing, and Sharing IoT Data in Near Real-Time -- 1 Introduction -- 2 Related Work -- 3 SANKMO -- 3.1 Architectural Vision -- 3.2 Implementation View -- 4 Results and Discussion -- 4.1 Experimental Evaluation -- 4.2 Production Layer -- 4.3 Data Transformation -- 4.4 Discussion -- 5 Concluding Remarks -- References -- A Polystore Proposed Environment Supported by an Edge-Fog Infrastructure -- 1 Introduction -- 2 Related Work -- 3 Proposed Environment -- 3.1 Development -- 3.2 Experimental Environment -- 4 Conclusion and Future Work -- References -- OASL: SPARQL Query Language for OpenAPI Ontologies -- 1 Introduction -- 2 Related Work and Background -- 3 OpenAPI Ontology -- 4 The OASL Query Language -- 5 Query Translation -- 6 Evaluation -- 6.1 Query Translation Overhead -- 6.2 Lack of Resulting Query Optimization -- 6.3 Schema Information Duplication Overhead -- 7 Conclusions and Future Work -- References -- Orchestrating Fog Computing Resources Based on the Multi-dimensional Multiple Knapsacks Problem -- 1 Introduction -- 2 Review Work -- 3 Multi-dimensional Multiple Knapsack Problem -- 4 Proposed Method -- 4.1 Problem Formulation -- 5 Simulation and Evaluation -- 5.1 Background -- 5.2 Results.
6 Conclusions.
Record Nr. UNINA-9910682550903321
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced information networking and applications . Volume 3. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli
Advanced information networking and applications . Volume 3. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , 2023
Descrizione fisica 1 online resource (710 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Computer networks
Information networks
ISBN 9783031286940
9783031286933
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910682585003321
Cham, Switzerland : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (717 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Artificial intelligence
ISBN 3-030-99584-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- An Approach for Mitigating Disruptions on Resources' Consumption Cycles -- 1 Introduction -- 2 Related Work -- 3 Resource Consumption in Brief -- 3.1 Consumption Properties -- 3.2 Disruption Handling -- 4 Scenarios to Mitigate Disruptions.
5 PN-based Verification of Consumption Cycles -- 6 Conclusion -- References -- Text Detection and Recognition Using Augmented Reality and Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Text detection and recognition based on Deep learning method -- 2.2 Text Detection and Recognition Based on Augmented Reality Method -- 3 Proposed Approach -- 3.1 Text Detection and Recognition Using DL -- 3.2 Text Visualization Using AR -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Energy Consumption Model of Servers to Make Virtual Machines Migrate -- 1 Introduction -- 2 Power Consumption and Computation Models of a Server -- 3 An Estimation Model of Energy Consumption -- 4 Migration of Virtual Machines -- 4.1 Energy Consumption for Migration of a Virtual Machine -- 4.2 Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- Development of a Blockchain-Based Ad Listing Application -- 1 Introduction -- 2 Terminology and Literature Review -- 3 Methodology -- 4 Design and Implementation -- 5 Conclusion and Future Work -- References -- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses -- 1 Introduction -- 2 Proposed Approach -- 2.1 Main Workflows -- 2.2 Neighborhood Rough Set and Three-Way Decisions -- 2.3 Time-Related Aspects of the Approach -- 3 Case Study -- 3.1 Dataset Description and Preparation -- 3.2 Experimentation and Evaluation -- 4 Final Remarks -- References -- Enhanced Autonomous Driving Through Improved 3D Objects Detection -- 1 Introduction -- 2 Presentation of the Proposed Model -- 2.1 Description of the Objects Detection Component -- 3 The Experimental Dataset -- 4 The Training Process -- 5 Presentation of the Performance Assessment Process -- 5.1 Performance Assessment Metrics -- 5.2 Investigation Concerning the Number and Placement of Sensors.
5.3 Remarks Regarding Additional Road Traffic Scenarios -- 6 Conclusions and Future Work -- References -- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel -- 1 Introduction -- 2 The Principle of Studied WuR-Based MAC -- 2.1 WuR-CA -- 2.2 WuR-NCA -- 3 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Throughput -- 4.3 Delay -- 4.4 Power Consumption -- 5 Results and Discussion -- 5.1 Variation in Number of Nodes -- 5.2 Effect of the Traffic Load -- 5.3 Variation in Data Packet Length -- 5.4 Variation in BER -- 6 Conclusion -- References -- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks -- 1 Introduction -- 2 Related Work -- 3 Protocol Design and DTMC Modeling of CaWuQoS-MAC -- 3.1 Protocol Design -- 3.2 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Delay -- 4.3 Power Consumption -- 5 Results and Discussion -- 5.1 Performance Analysis with Variable N -- 5.2 Performance Analysis vs. BER -- 5.3 Performance Analysis with Variable Traffic Load -- 6 Conclusion -- References -- A Dynamic ID Assignment Approach for Modular Robots -- 1 Introduction -- 2 Background on Unique ID Assignment -- 3 Dynamic ID Assignment Algorithm -- 3.1 Module Removal Handling -- 3.2 Module Addition Handling -- 4 Discussion -- 5 Experimental results -- 6 Conclusion and Future Work -- References -- Open-Source Publish-Subscribe Systems: A Comparative Study -- 1 Introduction -- 2 Related Work and Background -- 3 Functional Evaluation and Comparison -- 4 Performance Evaluation and Comparison -- 4.1 Experimental Results -- 5 Conclusions and Future Work -- References -- Conceptual Foundations of Code Rationalization Through a Case Study in Haskell -- 1 Introduction -- 2 Relevant Existing Contributions.
3 The Theoretical and Technological Fundamentals of Code Rationalization -- 3.1 Compliance with the Fundamental Principles of Software Systems Engineering -- 3.2 Elaboration and Systematic Utilization of Design Patterns -- 3.3 Elaboration and Systematic Utilization of Implementational Patterns -- 3.4 Consideration of the Optimal Programming Paradigms for a Certain Type of Problem -- 4 Generic Code Rationalization -- 4.1 Problem Statement -- 4.2 Code Rationalization as a Process to Seek the Optimal State of the Software Systems -- 5 Case Study -- 5.1 The Considered Problem -- 5.2 Example of Code Rationalization in Three Haskell Iterations -- 5.3 Final Remarks Related to the Presented Use Case -- 6 Conclusions -- References -- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Two-Phase Locking (2PL) Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Energy-Efficient Two-Phase Locking (EE2PL) Protocol -- 3.1 Meaningless Write Methods -- 3.2 Energy-Efficient 2PL (EE2PL) Protocol -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media -- 1 Introduction -- 2 Related Work -- 3 Co-owned Image Sharing -- 3.1 Multi-agent Model -- 4 Experimental Setup and Results -- 4.1 Results -- 5 Conclusion -- References -- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks -- 1 Introduction -- 2 Preliminary Assumptions for Analysis -- 3 Structural Controllability Restoration -- 3.1 STG-1: Strategy Using Backup Instances -- 3.2 STG-2: Strategy Using Edge Allocation.
3.3 STG-3: Strategy Using Diameter-Based Relinking -- 3.4 STG-4: Driver Node Injection Strategy -- 4 Experimental Results and Discussion -- 4.1 Network and Attacks Models -- 4.2 Analysis and Validation -- 4.3 Time Complexity Analysis -- 5 Conclusion and Future Work -- References -- Resource Authorization Methods for Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Requirements for the Authorization on Edge Computing Models -- 3.1 Edge Computing Models -- 3.2 Requirement for Applying the OAuth Flow to Resource Authorization on Edge Computing -- 4 Participant Relationships in Edge Computing Authorization -- 4.1 Concept of Privilege Delegation Model -- 4.2 Pattern Classification by Participant Relationship -- 4.3 Use Case of Each Pattern -- 4.4 Authorization Flow on Each Pattern -- 5 Discussion for Authorization Flow -- 5.1 Identifying User Location -- 5.2 Comparison with Original Flow -- 6 Conclusion -- References -- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Method -- 3.2 Dataset and Classification Features -- 4 Evaluation -- 4.1 Classification Results -- 4.2 Computational Performance -- 5 Conclusion -- References -- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 System Architecture -- 3.2 Data -- 3.3 Implementation -- 4 Evaluation Results -- 5 Conclusion -- References -- Automatic Monitoring System for Security Using IoT Devices and Smart Contracts -- 1 Introduction -- 2 Predicting the Failure of IoT Devices -- 3 Related Work -- 4 Proposed Method -- 4.1 System Flow -- 4.2 Concrete Example -- 5 Experiment -- 5.1 Experimental Methods and Results -- 5.2 Discussion -- 6 Conclusion -- References.
A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet.
Record Nr. UNINA-9910558499803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui