Edge Computing – EDGE 2018 [[electronic resource] ] : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings / / edited by Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 153 p. 79 illus.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers
Artificial intelligence Computer security Computer organization E-commerce Optical data processing Information Systems and Communication Service Artificial Intelligence Systems and Data Security Computer Systems Organization and Communication Networks e-Commerce/e-business Image Processing and Computer Vision |
ISBN | 3-319-94340-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research Track -- Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency -- Modular framework for Data Prefetching and Replacement at the Edge -- Boundless Application and Resource Based on Container Technology -- A Reconfigurable Streaming Processor for Real-Time Low-Power Execution of Convolutional Neural Networks at the Edge -- Application and Industry Track -- Efficient Bare Metal Auto-Scaling for NFV in Edge Computing -- Mobile Edge Offloading using Markov Decision Processes -- A Face Recognition System Based on Cloud Computing and AI Edge for IOT -- A Robust Retail POS System based on Blockchain and Edge Computing -- A Privacy Risk Aware Service Selection Approach for Service Composition -- Short Paper Track -- A Chinese Text Correction and Intention Identification Method for Speech Interactive Scene -- FCN-biLSTM Based VAT Invoice Recognition and Processing -- Research on Cross-chain Technology Based on Sidechain and Hash-locking. |
Record Nr. | UNISA-996465970703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Edge Computing – EDGE 2018 : Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings / / edited by Shijun Liu, Bedir Tekinerdogan, Mikio Aoyama, Liang-Jie Zhang |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 153 p. 79 illus.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers
Artificial intelligence Computer security Computer organization E-commerce Optical data processing Information Systems and Communication Service Artificial Intelligence Systems and Data Security Computer Systems Organization and Communication Networks e-Commerce/e-business Image Processing and Computer Vision |
ISBN | 3-319-94340-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research Track -- Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency -- Modular framework for Data Prefetching and Replacement at the Edge -- Boundless Application and Resource Based on Container Technology -- A Reconfigurable Streaming Processor for Real-Time Low-Power Execution of Convolutional Neural Networks at the Edge -- Application and Industry Track -- Efficient Bare Metal Auto-Scaling for NFV in Edge Computing -- Mobile Edge Offloading using Markov Decision Processes -- A Face Recognition System Based on Cloud Computing and AI Edge for IOT -- A Robust Retail POS System based on Blockchain and Edge Computing -- A Privacy Risk Aware Service Selection Approach for Service Composition -- Short Paper Track -- A Chinese Text Correction and Intention Identification Method for Speech Interactive Scene -- FCN-biLSTM Based VAT Invoice Recognition and Processing -- Research on Cross-chain Technology Based on Sidechain and Hash-locking. |
Record Nr. | UNINA-9910349431603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (146 pages) |
Disciplina | 354.81150006 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Internet of things |
ISBN | 3-031-23582-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results. 5 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996503466803316 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Internet of things - ICIOT 2022 : 7th international conference, held as part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, proceedings / / edited by Bedir Tekinerdogan, Yingwei Wang, Liang-Jie Zhang |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (146 pages) |
Disciplina | 354.81150006 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Internet of things |
ISBN | 3-031-23582-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Services Society -- Services Conference Federation (SCF) -- Contents -- Network Risk Assessment Method Based on Residual Risk Analysis -- 1 Introduction -- 2 Related work -- 3 Model -- 3.1 Formation Definition of Attack Graphs -- 3.2 Construction of Attack Graph Structure -- 3.3 Attack Maps to the Ring Algorithm -- 3.4 Attack Figure Parameters Construction -- 4 Experiment -- 5 Summary -- References -- EIMDC: A New Model for Designing Digital Twin Applications -- 1 Introduction -- 2 Related Works -- 3 EIMDC Model for Digital Twin Applications -- 3.1 Entity -- 3.2 Infrastructure -- 3.3 Data -- 3.4 Model -- 3.5 Context -- 4 Case Study -- 4.1 Entity -- 4.2 Infrastructure -- 4.3 Data -- 4.4 Model -- 4.5 Context -- 5 Conclusions -- References -- Penetration Testing: Smart Home IoT Devices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiments and Results -- 4.1 Network Scan Result -- 4.2 Exploit Attempt -- 5 Conclusion -- References -- A Comparative Analysis of User's Concerns and Government Policies on Autonomous Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Data Acquisition and Pre-processing -- 3.1 Social Media Scraping -- 3.2 Government Policies Scraping -- 3.3 Data Pre-processing -- 3.4 Data Categorization -- 4 Data Analysis: Methods and Results -- 4.1 Tri-gram and Word Frequency Analysis -- 4.2 Sentiment Analysis -- 4.3 Topic Modeling -- 4.4 Comparative Analysis: User Concerns VS Government Policies -- 5 Future Directions -- 6 Conclusion -- References -- Design of Multi-data Sources Based Forest Fire Monitoring and Early Warning System -- 1 Introduction -- 2 Related Works -- 3 Top-Level Design -- 3.1 Data Source -- 3.2 System Design Process -- 3.3 Functional Design -- 4 Algorithm Design -- 4.1 Forest Fire Point Satellite Monitoring -- 4.2 Forest Fire Point Video Monitoring.
4.3 Inspectors Report Monitoring and Early Warning -- 5 Implementation and Discussion -- References -- An IoT Simulator Tool for Provisioning Secure and Dynamic User-centric Services -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Performance Analysis of Cryptography Protocols -- 4.1 Protocol Selection Criteria -- 4.2 Performance Analysis -- 5 CupCarbon Tool Setup -- 6 Simulation Parameters -- 7 Simulation Results and Observations -- 7.1 No Encryption Vs. Blowfish Encryption -- 7.2 No Encryption Vs. NtruEncrypt Encryption -- 7.3 Blowfish vs NtruEncrypt Encryption -- 8 Conclusion -- References -- Exploration of Thermoelectric Energy Harvesting for Secure, TLS-Based Industrial IoT Nodes -- 1 Introduction -- 2 Related Work and Background -- 2.1 ULP Secure Wireless IoT Edge Devices -- 2.2 Thermoelectric Energy Harvesting -- 2.3 Energy Storage for Thermoelectric Energy Harvester -- 3 Setup -- 3.1 ULP Secure IoT Application -- 3.2 Energy Harvesting Module -- 3.3 Energy Storage Technologies -- 4 Analysis and Results -- 4.1 ULP Secure IoT Application -- 4.2 Energy Harvesting Module -- 4.3 Energy Storage Technologies -- 4.4 Entire IoT System -- 5 Conclusion -- 6 Future Work -- References -- Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices -- 1 Introduction -- 2 Methodology -- 2.1 Solution that Integrates DTLS Protocol and Overhearing Mechanism -- 2.2 Solution Integrating Quark into DTLS with Overhearing -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Comparison of Blynk IoT and ESP Rainmaker on ESP32 as Beginner-Friendly IoT Solutions -- 1 Introduction -- 2 IoT Platforms -- 2.1 Blynk IoT -- 2.2 ESP Rainmaker -- 3 Implementation -- 3.1 Hardware Implementation -- 3.2 Implementation of Blynk IoT -- 3.3 Implementation of ESP Rainmaker -- 4 Results. 5 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910639898303321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software Architecture [[electronic resource] ] : 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings / / edited by Bedir Tekinerdogan, Uwe Zdun, Ali Babar |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIII, 340 p. 81 illus.) |
Disciplina | 005 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Management information systems Computer science Programming languages (Electronic computers) Application software Software Engineering Management of Computing and Information Systems Programming Languages, Compilers, Interpreters Information Systems Applications (incl. Internet) |
ISBN | 3-319-48992-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465868403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Software Architecture : 10th European Conference, ECSA 2016, Copenhagen, Denmark, November 28 -- December 2, 2016, Proceedings / / edited by Bedir Tekinerdogan, Uwe Zdun, Ali Babar |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIII, 340 p. 81 illus.) |
Disciplina | 005 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Management information systems Computer science Programming languages (Electronic computers) Application software Software Engineering Management of Computing and Information Systems Programming Languages, Compilers, Interpreters Information Systems Applications (incl. Internet) |
ISBN | 3-319-48992-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484839603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|