![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
In-Vehicle Information Design to Enhance the Experience of Passengers in Autonomous Public Buses
The purpose of this study is to propose a concept design for an In-Vehicle Information System (IVIS) of an autonomous bus that provides an Autonomous Mobility on Demand (AMoD) service. First, we conducted a li...
-
Chapter and Conference Paper
Estimation of Greenhouse Gas Emissions in Cement Manufacturing Process Through Blockchain and SSL Based IoT Data Analysis
Recently, the Internet of Things (IoT) system, which supports human activities based on various types of real data, has attracted attention in various fields. However, the behavior of the system is determined ...
-
Chapter and Conference Paper
Design and Mobile Tracking Performance of a Retro-Directive Array (RDA) Antenna System
Beamforming is one of the most important technologies for wireless communication systems. A beamforming antenna system can control the radiation beam pattern and thus can reduce power consumption, compared wi...
-
Chapter and Conference Paper
Open Source Based Industrial IoT Platforms for Smart Factory: Concept, Comparison and Challenges
As Internet of Things (IoT) and Services are applied to manufacturing industries, Industry 4.0 is evolving. For Industry 4.0 to be realized in the factory, it is essential to implement horizontal integration o...
-
Chapter and Conference Paper
Search-and-Compute on Encrypted Data
Private query processing on encrypted databases allows users to obtain data from encrypted databases in such a way that the user’s sensitive data will be protected from exposure. Given an encrypted database, t...
-
Chapter and Conference Paper
Bubble Task: A Dynamic Execution Throttling Method for Multi-core Resource Management
Memory bandwidth is a major resource which is shared among all CPU cores. The development speed of memory bandwidth cannot catch up with the increasing number of CPU cores. Thus, the contention for occupying m...
-
Chapter and Conference Paper
Run Away If You Can: Persistent Jamming Attacks against Channel Hop** Wi-Fi Devices in Dense Networks
Wireless local area networks (WLANs) can adopt channel hop** technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though ...
-
Chapter and Conference Paper
Private Over-Threshold Aggregation Protocols
In this paper, we revisit the private k + data aggregation problem, and formally define the problem’s security requirements as both data and user privacy goals. To achieve both goals, and to str...
-
Chapter and Conference Paper
Main Content Extraction from Web Documents Using Text Block Context
Due to various Web authoring tools, the new web standards, and improved web accessibility, a wide variety of Web contents are being produced very quickly. In such an environment, in order to provide appropriat...
-
Chapter and Conference Paper
Mutual Private Set Intersection with Linear Complexity
A private set intersection (PSI) protocol allows players to obtain the intersection of their inputs. While in its unilateral version only the client can obtain the intersection, the mutual PSI protocol enables...
-
Chapter and Conference Paper
Data Dissemination Protocol Based on Home Agent and Access Node for Mobile Sink in Mobile Wireless Sensor Networks
Achieving efficient data dissemination to a mobile sink moving is one of the main challenges in wireless sensor networks. In this paper, we describe DHA, a data Dissemination protocol based on Home agent and A...
-
Chapter and Conference Paper
Multiplicative Attribute Graph Model of Real-World Networks
Large scale real-world network data such as social and information networks are ubiquitous. The study of such networks seeks to find patterns and explain their emergence through tractable models. In most netwo...
-
Chapter and Conference Paper
Active Binding Technology: A Reuse-Enabling Component Model
One of the primary obstacles to the reuse of independently-developed binary components on the industrial level lies in that the existing component technologies do not clearly separate component assembly from c...
-
Chapter and Conference Paper
The DecoyPort: Redirecting Hackers to Honeypots
Most of computer security systems use the signatures of well-known attacks to detect hackers’ attacks. For these systems, it is very important to get the accurate signatures of new attacks as soon as possible....
-
Chapter and Conference Paper
Consolidating with Media Streaming Server and Network Storage Card
Recently there have been a large number of multimedia demands of IP-based applications in tremendous Internet world. However, Internet-based multimedia services typically do not offer any quality of service be...
-
Chapter and Conference Paper
Reliable and Scalable State Management Using Migration of State Information in Web Services
The WS-Resource framework (WSRF) was proposed as a reengineering and evolution of OGSI to be compatible with the current Web services conventions and specifications. Although WSRF separates state management fr...
-
Chapter and Conference Paper
Design and Implementation of a Resource Management System Using On-Demand Software Streaming on Distributed Computing Environment
As distributed computing has become a large-scale environment such as grid computing, software resource management is rising as the key issue. In this paper, we propose a new resource management system, which ...
-
Chapter and Conference Paper
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provide enterprise level integrated...
-
Chapter and Conference Paper
Multi-level Independent Component Analysis
This paper presents a new method which uses multi-level density estimation technique to generate score function in ICA (independent Component Analysis). Score function is very closely related with density func...
-
Chapter and Conference Paper
Collaborative Filtering Based on Neural Networks Using Similarity
Recommendation is to offer information which fits user’s interests and tastes to provide better services and to reduce information overload. It recently draws attention upon Internet users and information prov...