top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Edge Computing – EDGE 2018 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings / / edited by Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang
Edge Computing – EDGE 2018 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings / / edited by Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 153 p. 79 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers
Artificial intelligence
Computer security
Computer organization
E-commerce
Optical data processing
Information Systems and Communication Service
Artificial Intelligence
Systems and Data Security
Computer Systems Organization and Communication Networks
e-Commerce/e-business
Image Processing and Computer Vision
ISBN 3-319-94340-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research Track -- Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency -- Modular framework for Data Prefetching and Replacement at the Edge -- Boundless Application and Resource Based on Container Technology -- A Reconfigurable Streaming Processor for Real-Time Low-Power Execution of Convolutional Neural Networks at the Edge -- Application and Industry Track -- Efficient Bare Metal Auto-Scaling for NFV in Edge Computing -- Mobile Edge Offloading using Markov Decision Processes -- A Face Recognition System Based on Cloud Computing and AI Edge for IOT -- A Robust Retail POS System based on Blockchain and Edge Computing -- A Privacy Risk Aware Service Selection Approach for Service Composition -- Short Paper Track -- A Chinese Text Correction and Intention Identification Method for Speech Interactive Scene -- FCN-biLSTM Based VAT Invoice Recognition and Processing -- Research on Cross-chain Technology Based on Sidechain and Hash-locking.
Record Nr. UNINA-9910349431603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Edge Computing – EDGE 2018 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings / / edited by Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang
Edge Computing – EDGE 2018 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings / / edited by Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 153 p. 79 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computers
Artificial intelligence
Computer security
Computer organization
E-commerce
Optical data processing
Information Systems and Communication Service
Artificial Intelligence
Systems and Data Security
Computer Systems Organization and Communication Networks
e-Commerce/e-business
Image Processing and Computer Vision
ISBN 3-319-94340-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research Track -- Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency -- Modular framework for Data Prefetching and Replacement at the Edge -- Boundless Application and Resource Based on Container Technology -- A Reconfigurable Streaming Processor for Real-Time Low-Power Execution of Convolutional Neural Networks at the Edge -- Application and Industry Track -- Efficient Bare Metal Auto-Scaling for NFV in Edge Computing -- Mobile Edge Offloading using Markov Decision Processes -- A Face Recognition System Based on Cloud Computing and AI Edge for IOT -- A Robust Retail POS System based on Blockchain and Edge Computing -- A Privacy Risk Aware Service Selection Approach for Service Composition -- Short Paper Track -- A Chinese Text Correction and Intention Identification Method for Speech Interactive Scene -- FCN-biLSTM Based VAT Invoice Recognition and Processing -- Research on Cross-chain Technology Based on Sidechain and Hash-locking.
Record Nr. UNISA-996465970703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (146 pages)
Disciplina 354.81150006
Collana Lecture Notes in Computer Science
Soggetto topico Internet of things
ISBN 3-031-23582-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results.
5 Conclusion -- References -- Author Index.
Record Nr. UNISA-996503466803316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (146 pages)
Disciplina 354.81150006
Collana Lecture Notes in Computer Science
Soggetto topico Internet of things
ISBN 3-031-23582-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results.
5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910639898303321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software Architecture [[electronic resource] ] : 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings / / edited by Bedir Tekinerdogan, Uwe Zdun, Ali Babar
Software Architecture [[electronic resource] ] : 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings / / edited by Bedir Tekinerdogan, Uwe Zdun, Ali Babar
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 340 p. 81 illus.)
Disciplina 005
Collana Programming and Software Engineering
Soggetto topico Software engineering
Management information systems
Computer science
Programming languages (Electronic computers)
Application software
Software Engineering
Management of Computing and Information Systems
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
ISBN 3-319-48992-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484839603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software Architecture [[electronic resource] ] : 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings / / edited by Bedir Tekinerdogan, Uwe Zdun, Ali Babar
Software Architecture [[electronic resource] ] : 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings / / edited by Bedir Tekinerdogan, Uwe Zdun, Ali Babar
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 340 p. 81 illus.)
Disciplina 005
Collana Programming and Software Engineering
Soggetto topico Software engineering
Management information systems
Computer science
Programming languages (Electronic computers)
Application software
Software Engineering
Management of Computing and Information Systems
Programming Languages, Compilers, Interpreters
Information Systems Applications (incl. Internet)
ISBN 3-319-48992-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465868403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui