Search
Now showing items 1-10 of 28
CS-Man: computation service management for IoT in-network processing.
(2016)
The Internet of Things (IoT) expects to link billions of devices to the Internet, which will produce massive amounts of data. Current approaches move the IoT data out of the network for processing. It results in long delays ...
Subjective evaluation of olfactory and visual media synchronization.
(ACM, 2013)
As a step towards enhancing users' perceived multimedia quality levels beyond the level offered by the classic audiovisual systems, the authors present the results of an experimental study which looked at user's perception ...
Multiple-scent enhanced multimedia synchronization.
(ACM, 2014-09)
This study looked at users' perception of inter-stream synchronization between audiovisual media and two olfactory streams. The
ability to detect skews, and the perception and impact of skews on user quality of experience ...
The influence of human factors on olfaction based mulsemedia quality of experience.
(IEEE, 2016)
With the aim to enrich users’ perceived
multimedia experience, the authors present the results of an
empirical study which looked at user perception of olfaction
based mulsemedia. The goal is to evaluate the influence ...
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)
As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),
enterprises are moving away from traditional perimeter based security models toward so called “zero trust
networking” ...
A framework for distributed cleaning of data streams.
(Elsevier, 2015)
Vast and ever increasing quantities of data are produced by sensors in the Internet of Things (IoT). The quality of this data can be
very variable due to problems with sensors, incorrect calibration etc. Data quality can ...
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)
—In this paper, we consider the problem of trust in
cloud monitoring systems. We design and develop a novel
scheme for trust certification using property based attestation
(PBA). The PBA is based on a trusted platform ...
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)
Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)
The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ...