Search
Now showing items 1-10 of 22
CS-Man: computation service management for IoT in-network processing.
(2016)
The Internet of Things (IoT) expects to link billions of devices to the Internet, which will produce massive amounts of data. Current approaches move the IoT data out of the network for processing. It results in long delays ...
Subjective evaluation of olfactory and visual media synchronization.
(ACM, 2013)
As a step towards enhancing users' perceived multimedia quality levels beyond the level offered by the classic audiovisual systems, the authors present the results of an experimental study which looked at user's perception ...
Multiple-scent enhanced multimedia synchronization.
(ACM, 2014-09)
This study looked at users' perception of inter-stream synchronization between audiovisual media and two olfactory streams. The
ability to detect skews, and the perception and impact of skews on user quality of experience ...
The influence of human factors on olfaction based mulsemedia quality of experience.
(IEEE, 2016)
With the aim to enrich users’ perceived
multimedia experience, the authors present the results of an
empirical study which looked at user perception of olfaction
based mulsemedia. The goal is to evaluate the influence ...
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),
enterprises are moving away from traditional perimeter based security models toward so called “zero trust
networking” ...
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)
—In this paper, we consider the problem of trust in
cloud monitoring systems. We design and develop a novel
scheme for trust certification using property based attestation
(PBA). The PBA is based on a trusted platform ...
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)
The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ...
Containers and clusters for edge cloud architectures - a technology review.
(IEEE, 2015-10-26)
Cloud technology is moving towards more distribution across multi-clouds and the inclusion of various devices, as evident through IoT and network integration in the context of edge cloud and fog computing. Generally, ...
Bidirectional LSTM autoencoder for sequence based anomaly detection in cyber security.
(United Kingdom Simulation Society, 2019)
Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is
generated can be usefully analyzed when cyber-security systems are effectively implemented with the aid ...