The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: Internet; crowdsourcing; software engineering; cyber security; successive iterative decoding; correlated Rayleigh fading envelope; pseudorandom phase generation; nonuniform signal constellation; network coding; mobile Web service; mobile Web services; fault tolerant architecture; context aware approach; arabic language processing; smart grid; video techniques;...
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
An important challenge for supporting multimedia applications in the Internet of Things is the security heterogeneity of wired and wireless sensor and actuator networks. In this work, we design a new and efficient media-aware security framework for facilitating various multimedia applications in the Internet of Things. First, we present a novel multimedia traffic classification and analysis method...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
The following topics are dealt with: database technology; pattern clustering; data mining; data security; Internet; image processing; neural nets; wireless sensor networks; telecommunications computing; geophysics computing; traffic engineering computing; video signal processing; computer aided instruction; satellite communications; and electronic commerce.
The following topics are dealt with: image processing; watermarking; cryptography; video signal processing; computer-aided instruction; Internet; information retrieval; wireless sensor network; solid modeling; robotics; land use planning; geographic information system; agriculture; and data security.
The following topics are dealt with: computational aspects of social networks; swarm-based computing; social network security; fast logic computation; middleware and component technology; smart home; complex networks and granular computing; intelligent systems; pattern analysis and optimization; business management applications; network control and intelligent computation; synergy between AI and brain...
The following topics are dealt with: ubiquitous and pervasive computing; wireless sensor networks; multimedia systems; P2P networks; Internet applications; distributed systems; ad hoc networks; security models; privacy models; parallel algorithms; and network protocols.
M2M, means “Machine to Machine”, including “Machine to Mobile”, “Man to Machine”, etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large...
The following topics are dealt with: network computing; performance optimization; failure management; cloud services; Web services; security; wireless sensor network; mobile ad hoc network; fault tolerance; overlay network; and telecommunication network routing.
The following topics are dealt with: data security; pattern classification; mobile computing; text-to-speech synthesis; user interfaces; Web services; medical computing; customer relationship management; optimisation; genetic algorithms; learning; data mining; computer aided instruction; software engineering; watermarking schemes; wireless sensor networks; educational administration; evolutionary...
A way of evaluation of a topology structure model, especially the Internet topology structure model, was studied. SLS (Signless Laplacian Spectra), is used to quantitatively identify the topology properties of the Internet generated by the model and the Internet out of real measuring. SLS eigenvectors could be gained out of this procedure, then a cross-correlation algorithm was performed on the eigenvectors...
The following deals with the following topics: algorithms; artificial intelligence; software engineering; bioinformatics; computer graphics; computer architecture; information systems; computer aided instruction; computer games; virtual reality; data security; digital simulation; computer aided design; ethical aspects; database systems; digital libraries; signal processing; image processing; logic...
The following topics are dealt with: distributed scheduling approach; backup sip server system; raid system; fault detection; neighbor-aware dynamic backoff algorithm; ad hoc networks; IP transition phase; data sharing; large scale enterprise; data mining; distributed data warehouses; parallel discrete event simulation; peer-to-peer streaming; OpenMP; service oriented architecture; business process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.