Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved withthe conference event and publication of the proceedings record.
the management of heterogeneous distributedsensor networks requires new solutions to address the problem of data quality and false data detection in Wireless sensor Networks (WSN). In this paper, we present a nonline...
详细信息
ISBN:
(纸本)9783319996080
the management of heterogeneous distributedsensor networks requires new solutions to address the problem of data quality and false data detection in Wireless sensor Networks (WSN). In this paper, we present a nonlinear cooperative control algorithm based on game theory and blockchain. Here, a new model is proposed for the automatic processing and management of data in heterogeneous distributed wireless sensor networks stored in a blockchain. We apply our algorithm for improving temperature data quality in indoor surfaces.
this research presents an innovative multi-agent system based on virtual organizations. It has been designed to manage the information collected by wireless sensor networks for knowledge discovery and decision making ...
详细信息
ISBN:
(纸本)9783319996080
this research presents an innovative multi-agent system based on virtual organizations. It has been designed to manage the information collected by wireless sensor networks for knowledge discovery and decision making in greenhouses. the developed multi-agent system allowed us to take decisions on the basis of the analysis of the historical data obtained from sensors. the proposed approach improves the efficiency of greenhouses by optimizing the use of resources.
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindere...
详细信息
ISBN:
(纸本)9781728152127
Modern bookcrossing leverages the mobile networks to help readers share books via convenient connection, and thus expedites the dissemination of information. However, the lack of traceability has significantly hindered the wide adoption of mobile bookcrossing, leading to loss of books. Meanwhile, the managerial inefficiency of current mobile bookcrossing systems becomes another obstacle for advancing the book circulation. To overcome these problems, we propose to leverage the promising blockchain technology withthe merits of its immutability and cryptographic smart contract. In this paper, we present BookChain, a traceable and efficient blockchain-based inner-campus book sharing system. BookChain stores the complete sharing data of an interested book permanently on blockchain, such that every reader can trace the borrowing history, which reduces the potential for loss of book. BookChain also introduces the use of smart contract to automate the circulation of books with minimal human intervention, resulting in the improvement of efficiency. the experimental results show the effectiveness and low-cost of the proposed system under high concurrent users.
Many real-world applications, from traditional wireless sensor networks to today's Internet of thing (IoT), generate a large amount of data streams distributively. To meet challenges of handling distributed data s...
详细信息
ISBN:
(纸本)9781728129808
Many real-world applications, from traditional wireless sensor networks to today's Internet of thing (IoT), generate a large amount of data streams distributively. To meet challenges of handling distributed data streams, deploying data streams management systems on public clouds is a prevalent choice. However, as data streams may contain sensitive information, appropriate privacy protection mechanisms must be in place when sending these data to the cloud. Aiming to utilize data outsourced to the cloud without disclosing their privacy, a number of functional encryption schemes have been proposed. Nevertheless, these existing schemes either only consider centralized data source or require pre-defined indexes. this paper proposes a privacy-preserving filtering scheme for distributed data streams outsourced to the public cloud. Our scheme allows cloud servers to filter out corresponding data streams directly over encrypted data. Our scheme enables each data source to encrypt its data independently, and thus the compromise of one data source will not reveal the privacy of others. thorough analysis and experimental evaluation are carried out to demonstrate the security, effectiveness, and efficiency of our scheme.
this paper describes the deployment of the Mobile Opportunistic Disconnection-Tolerant Networks and systems platform in heterogeneous real-world scenarios. Our aim is to prototype and test fully-distributed multi-laye...
详细信息
ISBN:
(纸本)9781728133164
this paper describes the deployment of the Mobile Opportunistic Disconnection-Tolerant Networks and systems platform in heterogeneous real-world scenarios. Our aim is to prototype and test fully-distributed multi-layer complex DTN forwarding and processing algorithms in different real-time dynamic topologies with varying mobility, network resources and data workload (publish-subscribe) patterns. In this work, we describe two different real-world contexts of mobile heterogeneous sensing and query in disconnection-prone environments: 1) networked drones and vehicles for agricultural monitoring applications and 2) vehicles and drone communications for smart city applications in urban environments. We discuss the performance characteristics of different mobile disconnection prone communication protocols and dynamic architectures across a range of criteria.
暂无评论