18th International Conference on Advanced Information Networking and Applications : proceedings : AINA 2004, 29-31 March, 2004, Fukuoka, Japan |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2004 |
Disciplina | 004.6 |
Soggetto topico |
Computer networks
Information networks Telecommunications Electrical & Computer Engineering Engineering & Applied Sciences |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996214788203316 |
[Place of publication not identified], : IEEE, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
18th International Conference on Advanced Information Networking and Applications : proceedings : AINA 2004, 29-31 March, 2004, Fukuoka, Japan |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2004 |
Disciplina | 004.6 |
Soggetto topico |
Computer networks
Information networks Telecommunications Electrical & Computer Engineering Engineering & Applied Sciences |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910872567703321 |
[Place of publication not identified], : IEEE, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems : 3-5 July, 2013, Asia University, Taichung, Taiwan / / Institute of Electrical and Electronics Engineers ; edited by, Leonard Barolli [and four others] |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013 |
Descrizione fisica | 1 online resource (179 pages) |
Disciplina | 003 |
Soggetto topico |
System theory
Computer networks Software engineering |
ISBN | 1-4799-0547-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910132912003321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems : 3-5 July, 2013, Asia University, Taichung, Taiwan / / Institute of Electrical and Electronics Engineers ; edited by, Leonard Barolli [and four others] |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013 |
Descrizione fisica | 1 online resource (179 pages) |
Disciplina | 003 |
Soggetto topico |
System theory
Computer networks Software engineering |
ISBN | 1-4799-0547-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280011603316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA) |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2013 |
Descrizione fisica | 1 online resource (cxv, 1658 pages) : illustrations |
Disciplina | 004.6 |
Soggetto topico | Information networks |
ISBN | 0-7695-4952-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996279729903316 |
[Place of publication not identified], : IEEE, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA) |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2013 |
Descrizione fisica | 1 online resource (cxv, 1658 pages) : illustrations |
Disciplina | 004.6 |
Soggetto topico | Information networks |
ISBN | 0-7695-4952-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910133740803321 |
[Place of publication not identified], : IEEE, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications [[electronic resource] ] : Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Volume 1 / / edited by Leonard Barolli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XXIX, 577 p. 249 illus., 188 illus. in color.) |
Disciplina | 620.00285 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering—Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence |
ISBN | 3-031-29056-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910682552103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced information networking and applications . Volume 2. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
Descrizione fisica | 1 online resource (601 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computer networks
Information networks |
ISBN |
9783031284519
9783031284502 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2023 Organizers -- Organization -- AINA-2023 Keynote Talks -- Blockchain and IoT Integration: Challenges and Future Directions -- Toward Sustainable, Intelligent, Secure, Fully Programmable, and Multisensory (SENSUOUS) Networks -- Contents -- Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments -- 1 Introduction -- 2 Background -- 2.1 Blockchain -- 2.2 Consensus Mechanisms -- 3 Integration of Consensus Algorithms and Evaluations -- 3.1 Integrations -- 3.2 Evaluation -- 4 Related Work -- 5 Conclusions and Future Work -- References -- Nexus: Proxy Service for the Web of Things -- 1 Introduction -- 2 Background and Related Work -- 3 Design and Architecture -- 3.1 Nexus Architecture -- 3.2 Front-End -- 3.3 Security -- 3.4 IoT Management -- 3.5 Directory -- 3.6 Publication and Subscription -- 4 Evaluation -- 5 Conclusions and Future Work -- References -- ABIDI: A Reference Architecture for Reliable Industrial Internet of Things -- 1 Introduction -- 2 The ABIDI Framework -- 3 A Building Management Use Case -- 4 Key Research Challenges -- 5 Conclusions -- References -- DASA: An Efficient Data Aggregation Algorithm for LoRa Enabled Fog Layer in Smart Agriculture*-4pt -- 1 Introduction -- 2 Related Work -- 3 Proposed Communication Framework -- 4 DASA: Proposed Data Aggregation Algorithm -- 5 Performance Evaluation -- 6 Conclusions and Future Work -- References -- FSET: Fast Structure Embedding Technique for Self-reconfigurable Modular Robotic Systems -- 1 Introduction -- 2 Related Work -- 3 FSET Technique -- 3.1 Recall of SET Algorithm -- 3.2 FSET: Fast SET Algorithm -- 4 Simulation and Results -- 4.1 Execution Time -- 4.2 Iteration Loop -- 4.3 Energy Consumption -- 5 Conclusion and Future Work -- References -- A Blockchain Based Authentication Mechanism for IoT in Agriculture 4.0.
1 Introduction -- 2 Literature Review -- 2.1 IoT Vulnerabilities and Threats in Agriculture 4.0 -- 2.2 Blockchain Technology -- 2.3 Blockchain Solutions in IoT Agriculture -- 3 Proposed Architecture -- 3.1 Iot Devices -- 3.2 Edge Gateway -- 3.3 Blockchain for Authentication -- 4 Conclusion -- References -- Performance Evaluation of FC-RDVM and LDIWM Router Placement Methods for WMNs by WMN-PSODGA Hybrid Simulation System Considering Load Balancing and Chi-Square Distribution of Mesh Clients -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Description of WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Uncertainty Handling with Type-2 Interval-Valued Fuzzy Logic in IoT Resource Classification -- 1 Introduction -- 2 EXEHDA-RR: Software Architecture -- 3 EXEHDA-RR Proposal Validation -- 4 Related Works -- 5 Conclusions -- References -- An Analysis of Representative Works of Japanese Literature Based on Emotions and Topics -- 1 Introduction -- 2 Analytical Techniques -- 2.1 Heat -- 2.2 TBAT -- 3 Analysis of Literary Works Based on Emotions -- 3.1 Target Literary Works -- 3.2 Emotional Analysis Results -- 4 Analysis of Literary Works Based on Topics -- 5 Conclusion -- References -- Analysis and Comparison of Machine Learning Models for Glucose Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 Forecasting Strategies -- 2.2 Forecasting Models -- 2.3 Walk-Forward Evaluation -- 3 Experiments -- 3.1 Data and Pre-processing -- 3.2 Results -- 4 Conclusions -- References -- On Enhancing Network Slicing Life-Cycle Through an AI-Native Orchestration Architecture -- 1 Introduction -- 2 Related Work -- 3 SFI2 AI-Native Architecture -- 4 Experimental Setup -- 5 Results and Discussion. 6 Concluding Remarks -- References -- Adaptive Inference on Reconfigurable SmartNICs for Traffic Classification -- 1 Introduction -- 2 Background and Related Work -- 3 Framework -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- eDeepRFID-IPS: Enhanced RFID Indoor Positioning with Deep Learning for Internet of Things -- 1 Introduction -- 2 Related Work -- 3 The proposed eDeepRFID-IPS System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Model for Artificial Conscience to Control Artificial Intelligence -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need to Control AI -- 2.2 Artificial Conscience and Controlling AI -- 2.3 Role of Trust -- 3 Trust Based Artificial Conscience - A Control Module for AI Systems -- 3.1 Trust Engine -- 3.2 Trust Pressure and Trust Sensitivity -- 3.3 Artificial Conscience - Control Module -- 4 Implementation -- 4.1 Data -- 4.2 Experimentation Setup and Results -- 5 Conclusion -- References -- A Vulnerability Risk Assessment Methodology Using Active Learning -- 1 Introduction -- 2 Related Work -- 3 Proposal and Methodology -- 3.1 ML-Based Risk Assessment -- 3.2 The Dataset -- 3.3 The Vulnerability Risk Labels -- 3.4 Labeling Strategy via Active Learning -- 3.5 Learning Strategy -- 4 Results -- 4.1 Experiments -- 4.2 Data Preprocessing and Evaluation Metrics -- 4.3 Discussion of Results -- 5 Conclusion and Future Work -- References -- A Fuzzy Inference and Posture Detection Based Soldering Motion Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Experimental Results -- 4 Conclusions -- References -- An Anomaly Detection System for Intelligent Robot Vision Using LSTM -- 1 Introduction -- 2 Proposed System -- 2.1 Anomaly Detection for Robot Vision -- 2.2 Visualization and Danger Notification for Robot Arm -- 3 Experimental Results -- 4 Conclusions -- References. GDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 The GDLS-FS Architecture -- 5 Proof-of-Concept: Implementation -- 6 Experiments and Results -- 6.1 Neighborhood Structure Microservices -- 6.2 Local Search Microservices -- 7 Conclusion -- References -- Multi-agent Deep Q-Learning Based Navigation -- 1 Introduction -- 2 Related Work -- 3 Preliminary Concepts -- 3.1 Q-Learning -- 3.2 Deep Q-Learning -- 4 Distributed Multi-agent Deep Q-learning Algorithm -- 4.1 Description of the Algorithm -- 5 Implementation and Results -- 6 Conclusion -- References -- Identifying Network Congestion on SDN-Based Data Centers with Supervised Classification*-6pt -- 1 Introduction -- 2 Motivation and Problem Definition -- 2.1 Congestion Control and Avoidance in SDN Data Centers -- 2.2 Related Work -- 3 Design and Implementation -- 3.1 Data Monitoring and Adjustments -- 3.2 Generating Classification Labels and Training the Models -- 4 Experimental Analysis -- 4.1 Metrics and Scenarios -- 4.2 Control Traffic -- 4.3 Results and Discussions -- 5 Conclusion -- References -- Detection of Malicious Sites Using Graph Machine Learning -- 1 Introduction -- 2 Preliminaries -- 3 Related Works -- 4 Our Proposal -- 5 Results and Discussions -- 6 Conclusion and Future Works -- References -- Bonet Detection Mechanism Using Graph Neural Network -- 1 Introduction -- 2 Background and Related Work -- 2.1 Activity and Event Network Model -- 2.2 Related Work -- 3 Proposed Graph Network Model -- 4 Experiments and Results -- 4.1 Datasets -- 4.2 Performance Metrics -- 4.3 Considered Scenarios and Results -- 5 Conclusion -- References -- Object Placement Algorithm with Information Flow Control in Fog Computing Model -- 1 Introduction -- 2 System Model. 2.1 CBAC (Capability-Based Access Control) Model -- 2.2 FC (Fog Computing) Model -- 2.3 Information Flow Relations -- 3 Object Placement Algorithm -- 4 Information Flow Control in the FC Model -- 5 Concluding Remarks -- References -- An Energy-Aware Algorithm for Changing Tree Structure and Process Migration in the Flexible Tree-Based Fog Computing Model -- 1 Introduction -- 2 The TBFC Model -- 2.1 Tree Structure of Nodes -- 2.2 Power Consumption and Computation Models -- 3 The FTBFC Model -- 3.1 Operations on the FTBFC Model -- 3.2 Flexible Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- SANKMO: An Approach for Ingestion, Processing, Storing, and Sharing IoT Data in Near Real-Time -- 1 Introduction -- 2 Related Work -- 3 SANKMO -- 3.1 Architectural Vision -- 3.2 Implementation View -- 4 Results and Discussion -- 4.1 Experimental Evaluation -- 4.2 Production Layer -- 4.3 Data Transformation -- 4.4 Discussion -- 5 Concluding Remarks -- References -- A Polystore Proposed Environment Supported by an Edge-Fog Infrastructure -- 1 Introduction -- 2 Related Work -- 3 Proposed Environment -- 3.1 Development -- 3.2 Experimental Environment -- 4 Conclusion and Future Work -- References -- OASL: SPARQL Query Language for OpenAPI Ontologies -- 1 Introduction -- 2 Related Work and Background -- 3 OpenAPI Ontology -- 4 The OASL Query Language -- 5 Query Translation -- 6 Evaluation -- 6.1 Query Translation Overhead -- 6.2 Lack of Resulting Query Optimization -- 6.3 Schema Information Duplication Overhead -- 7 Conclusions and Future Work -- References -- Orchestrating Fog Computing Resources Based on the Multi-dimensional Multiple Knapsacks Problem -- 1 Introduction -- 2 Review Work -- 3 Multi-dimensional Multiple Knapsack Problem -- 4 Proposed Method -- 4.1 Problem Formulation -- 5 Simulation and Evaluation -- 5.1 Background -- 5.2 Results. 6 Conclusions. |
Record Nr. | UNINA-9910682550903321 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced information networking and applications . Volume 3. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (710 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computer networks
Information networks |
ISBN |
9783031286940
9783031286933 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910682585003321 |
Cham, Switzerland : , : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (717 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Artificial intelligence |
ISBN | 3-030-99584-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- An Approach for Mitigating Disruptions on Resources' Consumption Cycles -- 1 Introduction -- 2 Related Work -- 3 Resource Consumption in Brief -- 3.1 Consumption Properties -- 3.2 Disruption Handling -- 4 Scenarios to Mitigate Disruptions.
5 PN-based Verification of Consumption Cycles -- 6 Conclusion -- References -- Text Detection and Recognition Using Augmented Reality and Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Text detection and recognition based on Deep learning method -- 2.2 Text Detection and Recognition Based on Augmented Reality Method -- 3 Proposed Approach -- 3.1 Text Detection and Recognition Using DL -- 3.2 Text Visualization Using AR -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Energy Consumption Model of Servers to Make Virtual Machines Migrate -- 1 Introduction -- 2 Power Consumption and Computation Models of a Server -- 3 An Estimation Model of Energy Consumption -- 4 Migration of Virtual Machines -- 4.1 Energy Consumption for Migration of a Virtual Machine -- 4.2 Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- Development of a Blockchain-Based Ad Listing Application -- 1 Introduction -- 2 Terminology and Literature Review -- 3 Methodology -- 4 Design and Implementation -- 5 Conclusion and Future Work -- References -- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses -- 1 Introduction -- 2 Proposed Approach -- 2.1 Main Workflows -- 2.2 Neighborhood Rough Set and Three-Way Decisions -- 2.3 Time-Related Aspects of the Approach -- 3 Case Study -- 3.1 Dataset Description and Preparation -- 3.2 Experimentation and Evaluation -- 4 Final Remarks -- References -- Enhanced Autonomous Driving Through Improved 3D Objects Detection -- 1 Introduction -- 2 Presentation of the Proposed Model -- 2.1 Description of the Objects Detection Component -- 3 The Experimental Dataset -- 4 The Training Process -- 5 Presentation of the Performance Assessment Process -- 5.1 Performance Assessment Metrics -- 5.2 Investigation Concerning the Number and Placement of Sensors. 5.3 Remarks Regarding Additional Road Traffic Scenarios -- 6 Conclusions and Future Work -- References -- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel -- 1 Introduction -- 2 The Principle of Studied WuR-Based MAC -- 2.1 WuR-CA -- 2.2 WuR-NCA -- 3 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Throughput -- 4.3 Delay -- 4.4 Power Consumption -- 5 Results and Discussion -- 5.1 Variation in Number of Nodes -- 5.2 Effect of the Traffic Load -- 5.3 Variation in Data Packet Length -- 5.4 Variation in BER -- 6 Conclusion -- References -- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks -- 1 Introduction -- 2 Related Work -- 3 Protocol Design and DTMC Modeling of CaWuQoS-MAC -- 3.1 Protocol Design -- 3.2 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Delay -- 4.3 Power Consumption -- 5 Results and Discussion -- 5.1 Performance Analysis with Variable N -- 5.2 Performance Analysis vs. BER -- 5.3 Performance Analysis with Variable Traffic Load -- 6 Conclusion -- References -- A Dynamic ID Assignment Approach for Modular Robots -- 1 Introduction -- 2 Background on Unique ID Assignment -- 3 Dynamic ID Assignment Algorithm -- 3.1 Module Removal Handling -- 3.2 Module Addition Handling -- 4 Discussion -- 5 Experimental results -- 6 Conclusion and Future Work -- References -- Open-Source Publish-Subscribe Systems: A Comparative Study -- 1 Introduction -- 2 Related Work and Background -- 3 Functional Evaluation and Comparison -- 4 Performance Evaluation and Comparison -- 4.1 Experimental Results -- 5 Conclusions and Future Work -- References -- Conceptual Foundations of Code Rationalization Through a Case Study in Haskell -- 1 Introduction -- 2 Relevant Existing Contributions. 3 The Theoretical and Technological Fundamentals of Code Rationalization -- 3.1 Compliance with the Fundamental Principles of Software Systems Engineering -- 3.2 Elaboration and Systematic Utilization of Design Patterns -- 3.3 Elaboration and Systematic Utilization of Implementational Patterns -- 3.4 Consideration of the Optimal Programming Paradigms for a Certain Type of Problem -- 4 Generic Code Rationalization -- 4.1 Problem Statement -- 4.2 Code Rationalization as a Process to Seek the Optimal State of the Software Systems -- 5 Case Study -- 5.1 The Considered Problem -- 5.2 Example of Code Rationalization in Three Haskell Iterations -- 5.3 Final Remarks Related to the Presented Use Case -- 6 Conclusions -- References -- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Two-Phase Locking (2PL) Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Energy-Efficient Two-Phase Locking (EE2PL) Protocol -- 3.1 Meaningless Write Methods -- 3.2 Energy-Efficient 2PL (EE2PL) Protocol -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media -- 1 Introduction -- 2 Related Work -- 3 Co-owned Image Sharing -- 3.1 Multi-agent Model -- 4 Experimental Setup and Results -- 4.1 Results -- 5 Conclusion -- References -- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks -- 1 Introduction -- 2 Preliminary Assumptions for Analysis -- 3 Structural Controllability Restoration -- 3.1 STG-1: Strategy Using Backup Instances -- 3.2 STG-2: Strategy Using Edge Allocation. 3.3 STG-3: Strategy Using Diameter-Based Relinking -- 3.4 STG-4: Driver Node Injection Strategy -- 4 Experimental Results and Discussion -- 4.1 Network and Attacks Models -- 4.2 Analysis and Validation -- 4.3 Time Complexity Analysis -- 5 Conclusion and Future Work -- References -- Resource Authorization Methods for Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Requirements for the Authorization on Edge Computing Models -- 3.1 Edge Computing Models -- 3.2 Requirement for Applying the OAuth Flow to Resource Authorization on Edge Computing -- 4 Participant Relationships in Edge Computing Authorization -- 4.1 Concept of Privilege Delegation Model -- 4.2 Pattern Classification by Participant Relationship -- 4.3 Use Case of Each Pattern -- 4.4 Authorization Flow on Each Pattern -- 5 Discussion for Authorization Flow -- 5.1 Identifying User Location -- 5.2 Comparison with Original Flow -- 6 Conclusion -- References -- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Method -- 3.2 Dataset and Classification Features -- 4 Evaluation -- 4.1 Classification Results -- 4.2 Computational Performance -- 5 Conclusion -- References -- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 System Architecture -- 3.2 Data -- 3.3 Implementation -- 4 Evaluation Results -- 5 Conclusion -- References -- Automatic Monitoring System for Security Using IoT Devices and Smart Contracts -- 1 Introduction -- 2 Predicting the Failure of IoT Devices -- 3 Related Work -- 4 Proposed Method -- 4.1 System Flow -- 4.2 Concrete Example -- 5 Experiment -- 5.1 Experimental Methods and Results -- 5.2 Discussion -- 6 Conclusion -- References. A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet. |
Record Nr. | UNINA-9910558499803321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|