A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Scalable IoT Video Data Analytics for Smart Cities
2018
EAI Endorsed Transactions on Context-aware Systems and Applications
IoT provides the ability to manage, remotely monitor and control devices from massive streams of real-time data.Our model offers a scalable IoT video data analytics applications for Smart cities to end ...
This model provides data analytics programming suites and environments in which developers and researchers can design scalable analytics services and applications. ...
Wang [1] presents a scalable, privacy-aware architecture for large camera networks. ...
doi:10.4108/eai.13-7-2018.163136
fatcat:ql5attjsuzbqbfxoo2ku6so6ki
Best Papers of the ACM Multimedia Systems (MMSys) Conference 2017 and the ACM Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV) 2017
2018
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
VR (Virtual Reality), and (iv) IoT (Internet-of-Things) Connectivity and Infrastructure. ...
In "ASAP: Adaptive Stall-Aware Pacing for Improved DASH Video Experience in Cellular Network" (https://doi.org/10.1145/3219750), Zahran et al. present novel DASH traffic management solutions, which reduce ...
The algorithm is shown to outperform other prediction algorithms, because the proposed algorithm is finer-grained, and trend-, periodicity-, and autocorrelation-aware. ...
doi:10.1145/3214700
fatcat:nqsbyw77w5fpfkttpxrcckxxlm
Supporting Audio Privacy-aware Services in Emerging IoT Environment
2021
International Journal of Wireless and Microwave Technologies
In this paper, a new architecture for providing audio transparency and privacy in the IoT-rich environment is proposed. ...
Among them, some of the data are sensitive and a user may not aware of when and where audio recordings are sent for processing. ...
Conclusions As IoT devices increasingly adopt microphones and other voice assistant devices, there is a growing need for practical privacy defenses. ...
doi:10.5815/ijwmt.2021.03.04
fatcat:ijyge5omufgifealc4g3uxn26m
Challenges in designing edge-based middlewares for the Internet of Things: A survey
[article]
2019
arXiv
pre-print
An edge-based middleware is defined as a software that serves as an interface between the computational resources and the IoT devices, making communication possible among elements. ...
In this regard, we propose a four-layer architecture for the design of edge-based middleware, along with some design goals for each of the proposed layer. ...
ACKNOWLEDGMENTS This research is supported in part by NSF via grants numbers OAC 1339036, OAC 1441376, OCE 1745246, OAC 1826997, OAC 1835692, and OAC 1640834, and was conducted as part of the Rutgers Discovery ...
arXiv:1912.06567v1
fatcat:7it2ztkngrhsld244agl7eoyoq
BlendSPS: A BLockchain-ENabled Decentralized Smart Public Safety System
2020
Smart Cities
scalable and extensible services in a large-scale heterogeneous network environment. ...
Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud Computing technologies, the Smart Public Safety (SPS) system has become a more realistic solution for seamless public safety ...
Therefore, adopting monolithic framework in a distributed IoT-based network inevitably brings new challenges in terms of scalability, service extensibility, data privacy, and cross-platform interoperability ...
doi:10.3390/smartcities3030047
fatcat:yrzfdm2qlbcf5e5n63oioc2vma
Survey on Multi-Access Edge Computing for Internet of Things Realization
2018
IEEE Communications Surveys and Tutorials
IoT is identified as a key use case of MEC, given MEC's ability to provide cloud platform and gateway services at the network edge. ...
In this survey, we provide a holistic overview on the exploitation of MEC technology for the realization of IoT applications and their synergies. ...
IoT architecture [160] Propose a trust translation model for fog nodes and a privacy-aware model for access control at fog nodes. ...
doi:10.1109/comst.2018.2849509
fatcat:fnksr3dbqfakzfvnopyyxjdlfm
A Survey on Secure Data Analytics in Edge Computing
2019
IEEE Internet of Things Journal
In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing ...
Unfortunately, edge computing brings new security and privacy challenges when applied to data analytics. ...
Towards service delivery, MEC and fog computing can serve for such IoT applications that have strict requirements on low latency, location awareness, mobility and context awareness. ...
doi:10.1109/jiot.2019.2897619
fatcat:fqmkiuse4vgafhiexe4ymqtx6m
Edge-Computing-Enabled Smart Cities: A Comprehensive Survey
[article]
2020
arXiv
pre-print
Later, we categorize and classify the literature by devising a comprehensive and meticulous taxonomy. ...
Such applications continuously generate enormous amounts of data which demand strict latency-aware computational processing capabilities. ...
[71] • Proposed an architecture for remote live support. • A video compression is adopted to reduce the bandwidth requirement. Qiao et al. ...
arXiv:1909.08747v2
fatcat:nwnyec5gnfdmtd3msohsbkgulm
khan2020.pdf
2021
figshare.com
[71] • Proposed an architecture for remote live support. • A video compression is adopted to reduce the bandwidth requirement. Qiao et al. ...
. • Context-awareness, scalability, and sustainability are also exploited in the proposed system. • Narrow-band IoT is used for communication due to its high energy efficiency, low cost, and support for ...
doi:10.6084/m9.figshare.14099087.v1
fatcat:nipztbbrgrcwvp2dy6m2gbyytm
5G Internet of Things: A survey
2018
Journal of Industrial Information Integration
The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards. ...
This paper reviews the current research state-of-the-art of 5G IoT, key enabling technologies, and main research trends and challenges in 5G IoT 1 . ...
The convergence of 5G, AI, data analytic and IoT [53] . ...
doi:10.1016/j.jii.2018.01.005
fatcat:wst2mrwbpjgxvdqqig3yj4ofum
A Survey on Use Cases and Security Issues in Fog Computing
2018
Helix
These issues can be resolved by using a new concept called, Fog Computing. Fog computing is an emerging research area for both academia and industry. ...
In this paper, we view and summarize different use case scenarios of fog computing. The recent research contributions on security and privacy issues in fog computing are also discussed in this paper. ...
The author also well studied several existing researches for security and privacy challenges in fog services [9] . ...
doi:10.29042/2018-4413-4417
fatcat:5tjpvrghtvfhtj4gdd3yucfg2y
All One Needs to Know about Fog Computing and Related Edge Computing Paradigms
2019
Journal of systems architecture
IoT is expected to connect billions of devices and humans to bring promising advantages for us. ...
Next, we provide a taxonomy of research topics in fog computing, and through a comprehensive survey, we summarize and categorize the efforts on fog computing and its related computing paradigms. ...
Xu et al. proposed edge analytics as a service (EAaaS) to promote a lightweight, scalable, and low-latency service model for IoT devices
Figure 10 : 10 A bar chart showing the number of research articles ...
doi:10.1016/j.sysarc.2019.02.009
fatcat:udonbl6rerfwdap2psex7ryloa
Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications
2017
2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
In this paper we introduce a novel distributed privacy infrastructure for the Internet-of-Things and discuss in particular how it can help enhance user's awareness of and control over the collection and ...
These developments raise privacy concerns and call for novel solutions to ensure adequate user awareness, and ideally, control over the resulting collection and use of potentially sensitive data. ...
The US Government is authorized to reproduce and distribute reprints for Governmental purposes not withstanding any copyright notation thereon. Additional support has also been provided by Google. ...
doi:10.1109/cvprw.2017.181
dblp:conf/cvpr/DasDWWSS17
fatcat:xm7tk7ntlrbedj2gqxxpanlwde
Survey Based on Security Aware Caching Scheme for IoT Based Information Centric Networking
2020
EAI Endorsed Transactions on Energy Web
In this work, an several architecture for effective caching at the edge devices for data-centric IoT applications and a rapid content access that depends on novel deep learning techniques and caching processes ...
Security of client and content, originating place, and identity privacy are inherent in ICN paradigm design in contrast to present host centric concept where they are introduced as a second-thought. ...
for scalability. ...
doi:10.4108/eai.1-7-2020.165960
fatcat:ndhynglnpzdapcyx4ftcyrstda
Next Generation Internet of Things
[chapter]
2018
Next Generation Internet of Things
The chapter presents an overview of the eight that are part of the European IoT Security and Privacy Projects initiative (IoT-ESP) addressing advanced concepts for end-to-end security in highly distributed ...
addressing object identity management, discovery services, virtualisation of objects, devices and infrastructures and trusted IoT approaches. ...
IoTCrawler focuses on providing reliable, quality and resource-aware and scalable mechanisms for data and services publishing, crawling, indexing in very large-scale distributed dynamic IoT environments ...
doi:10.13052/rp-9788770220071
fatcat:bnyyfkhdzbghxetcwhisrqsapq
« Previous
Showing results 1 — 15 out of 2,032 results