We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 682 results
  1. Data Acquisition for Integrated Coastal Zone Management and Planning in a Climate Change Perspective

    The coastal zones are characterised with high populations densities and sensitive ecosystems which requires efficient planning and management. The...
    Lone S. Hendriksen, Henning Sten Hansen, Lars Stenseng in Electronic Government and the Information Systems Perspective
    Conference paper 2020
  2. Evolution of Applications: From Natively Installed to Web and Decentralized

    Applications evolve from year to year either to fit consumer needs or to increase productivity and simplify work for developers. With the rapid...
    Adrian Petcu, Madalin Frunzete, Dan Alexandru Stoichescu in Computational Science and Its Applications – ICCSA 2023 Workshops
    Conference paper 2023
  3. Cloud-Network Slicing MANO Towards an Efficient IoT-Cloud Continuum

    This work sets out by exploiting the NECOS Cloud-Network Slicing concept to form the Cloud-to-Things continuum. We adopt the Network-Slicing...

    Douglas B. Maciel, Emidio P. Neto, ... Silvio C. Sampaio in Journal of Grid Computing
    Article 08 November 2021
  4. Principles of 6G Wireless Networks

    Early in 2018, the 6G technology was first discussed by US FCC in a public forum. Subsequently, Finland started to initiate the 6G research and held...
    Qinghe Du, Houbing Song, ... Zhongmin Ma in The Road towards 6G: Opportunities, Challenges, and Applications
    Chapter 2024
  5. Confidential information protection method of commercial information physical system based on edge computing

    With the rapid integration and wide application of the enterprise Internet of Things, big data and 5G-class large networks, traditional enterprise...

    **aheng Zhang, Jiazhong Lu, Doudou Li in Neural Computing and Applications
    Article 17 August 2020
  6. Executable Documentation: From Documentation Languages to Purpose-Specific Languages

    We present executable documentation as a natural continuation of a long-term trend of documentation/code alignment that started with self-documenting...
    Conference paper 2022
  7. A Novel SDN-Based IOT Security Architecture Model for Big Data

    In this paper, A Novel SDN-Based IoT Security Architecture Model for Big Data is implemented. To control and manage the network, Software Defined...
    Ojaswi Bhimineni, Geda Sai Venkata Abhijith, Srikanth Prabhu in Applications and Techniques in Information Security
    Conference paper 2022
  8. Vehicular mobility patterns and their applications to Internet-of-Vehicles: a comprehensive survey

    With the growing popularity of the Internet-of-Vehicles (IoV), it is of pressing necessity to understand transportation traffic patterns and their...

    Qimei Cui, **ngxing Hu, ... Martin Haenggi in Science China Information Sciences
    Article Open access 25 October 2022
  9. Attacks and failures prediction framework for a collaborative 5G mobile network

    Although mobile technologies keep evolving through years, Fault management and cyber-security management in mobile networks are still treated as...

    Yosra Benslimen, Hichem Sedjelmaci, Ana-Cristina Manenti in Computing
    Article 23 January 2021
  10. Fuzzy based multi-criteria vertical handover decision modeling in heterogeneous wireless networks

    Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these...

    Murad Khan, Awais Ahmad, ... Jamil Ahmad in Multimedia Tools and Applications
    Article 10 January 2017
  11. Measuring the Impact of Tactical Denial of Sustainability

    The adoption of the latest advances in Information and Communication Technologies (ICT) at the military operational edge raises promising points of...
    Pedro Ramón y Cajal Ramo, Jorge Maestre Vidal, Marco Antonio Sotelo Monge in Computer Security. ESORICS 2021 International Workshops
    Conference paper 2022
  12. Effective Communication in Transition Care During Shift Change

    The aim of this study is to examine the effective communication process during shift changes in a transitional care unit; communication should be...
    Filipe Fernandes, Almeida Dias, ... José Neves in Progress in Artificial Intelligence
    Conference paper 2022
  13. Preserving flow table integrity in OpenFlow networks through smart contract

    Software-Defined Networking (SDN) has transformed network management by introducing a centralized controller that simplifies network configuration....

    Birglang Bargayary, Nabajyoti Medhi in Cluster Computing
    Article 29 November 2023
  14. How to Adapt and Implement a Large-Scale Agile Framework in Your Organization

    You can adapt a Large-Scale Agile Framework suitable for your organization using the methodology presented or develop it yourself from scratch—for a...
    Chapter 2023
  15. Wild Swarms: Autonomous Drones for Environmental Monitoring and Protection

    In this paper, we present an example case study of how an autonomous swarm-based Multi-Robot System (MRS) could contribute to environmental...
    Fabrice Saffre, Hannu Karvonen, Hanno Hildmann in New Developments and Environmental Applications of Drones
    Conference paper 2024
  16. Automotive Head-Up Display Systems: A Bibliometric and Trend Analysis

    This study focuses on the analysis and summary of HUD-related studies for the period 2017–2022. Based on the bibliometric approach, the 1009 papers...
    Chunwang Yang, Hao Tan in Cross-Cultural Design
    Conference paper 2023
  17. MIH-Based eNB Selection for Untrusted Networks

    In recent years, some mobile phones are equipped with more than one Radio Access Technology (RAT) to make themselves adapt to a heterogeneous...
    Fang-Yie Leu, Kun-Lin Tsai, Rui-Ting Hung in Wireless Internet
    Conference paper 2019
  18. Vulnerabilities in Fog/Edge Computing from Architectural Perspectives

    Recently, the emerging IoTization paradigm generates a tremendous amount of heterogeneous data offloaded from digital devices to networks. The...
    Nhu-Ngoc Dao, Ngoc-Thanh Dinh, ... Torsten Braun in Fog/Edge Computing For Security, Privacy, and Applications
    Chapter 2021
  19. ‘The Discipline of Steel’: Technical Knowledge in the Coordinative Practices of Steelmaking

    This is a study of the cooperative work of making steel in a contemporary steel plant. The study is, first of all, a study of the coordinative...

    Article Open access 28 May 2024
  20. Network Slicing Cost Allocation Model

    Within the upcoming fifth generation (5G) mobile networks, a lot of emerging technologies, such as Software Defined Network (SDN), Network Function...

    Asma Chiha, Marlies Van der Wee, ... Sofie Verbrugge in Journal of Network and Systems Management
    Article 10 March 2020
Did you find what you were looking for? Share feedback.