Search
Now showing items 1-10 of 60
CS-Man: computation service management for IoT in-network processing.
(2016)
The Internet of Things (IoT) expects to link billions of devices to the Internet, which will produce massive amounts of data. Current approaches move the IoT data out of the network for processing. It results in long delays ...
Subjective evaluation of olfactory and visual media synchronization.
(ACM, 2013)
As a step towards enhancing users' perceived multimedia quality levels beyond the level offered by the classic audiovisual systems, the authors present the results of an experimental study which looked at user's perception ...
Multiple-scent enhanced multimedia synchronization.
(ACM, 2014-09)
This study looked at users' perception of inter-stream synchronization between audiovisual media and two olfactory streams. The
ability to detect skews, and the perception and impact of skews on user quality of experience ...
A survey of modern deep learning based object detection models
(Elsevier, 2022-06-30)
Object Detection is the task of classification and localization of objects in an image or video. It has gained prominence in recent years due to its widespread applications. This article surveys recent developments in deep ...
The influence of human factors on olfaction based mulsemedia quality of experience.
(IEEE, 2016)
With the aim to enrich users’ perceived
multimedia experience, the authors present the results of an
empirical study which looked at user perception of olfaction
based mulsemedia. The goal is to evaluate the influence ...
Block-chain empowered multi-robot collaboration to fight COVID-19 and future pandemics
(IEEE, 2021-03-25)
This conceptual paper overviews how blockchain technology is involving the operation
of multi-robot collaboration for combating COVID-19 and future pandemics. Robots are a promising
technology for providing many tasks ...
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),
enterprises are moving away from traditional perimeter based security models toward so called “zero trust
networking” ...
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...