1,435 Hits in 8.4 sec

Evaluating Auction Mechanisms for the Preservation of Cost-Aware Digital Objects under Constrained Digital Preservation Budgets

Andres El-Fakdi, Josep Lluis de la Rosa
2021 Mathematics  
the now-called cost-aware digital objects for efficient management of available budget.  ...  the digital preservation problem where digital objects share part of the responsibility for self-preservation.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/math10010092 fatcat:hq7s6yy7szdctozu3n2ka6bl3e

Guest Editorial Introduction of the Special Issue on Edge Intelligence for Internet of Vehicles

Yan Zhang, Celimuge Wu, Rodrigo Roman, Hong Liu
2021 IEEE transactions on intelligent transportation systems (Print)  
In this article, the authors investigate the joint edge caching and computation management mechanism for IoVs to realize delay-sensitive IoV services in a cost-efficient way.  ...  The objective of this Special Issue is to present the latest results, insights, and perspectives on the new area of edge intelligence-empowered IoV.  ...  Digital Object Identifier 10.1109 /TITS.2021 The accepted papers cover a wide range of topics for enabling edge intelligence in IoV environments.  ... 
doi:10.1109/tits.2021.3066837 fatcat:z26pc73kbvb5lhdcjcrylfbzbm

A taxonomy of market-based resource management systems for utility-driven cluster computing

Chee Shin Yeo, Rajkumar Buyya
2006 Software, Practice & Experience  
For example, the cluster Resource Management System (RMS) is a middleware that manages the resources and seamless execution of jobs in a cluster of computers.  ...  The first requirement allows the market-based cluster RMS to be aware of usercentric service requirements so that competing service requests can be prioritized more accurately.  ...  ACKNOWLEDGMENT We would like to acknowledge all developers of the market-based resource management systems described in the paper.  ... 
doi:10.1002/spe.725 fatcat:6jqpwyqfdva33ffhkfwwu6gafa

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
This survey can serve as basis for the development of modern differential privacy techniques to address various problems and data privacy scenarios of CPSs.  ...  In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past.  ...  Therefore, preservation of this information is very crucial for smooth running of auction mechanism in smart grid [187] .  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

A survey on game theoretical methods in Human–Machine Networks

Xueqin Liang, Zheng Yan
2017 Future generations computer systems  
How to plan a proper budget is an important issue for crowdsourcers.  ...  The authors analyzed the NE under different success probability of DDoS with or without an attack cost.  ... 
doi:10.1016/j.future.2017.10.051 fatcat:55v7cpi64ndb3apj4ngbkin5ue

Adopting incentive mechanisms for large-scale participation in mobile crowdsensing: from literature review to a conceptual framework

R. I. Ogie
2016 Human-Centric Computing and Information Sciences  
The phenomenal growth in the richness and diversity of sensors on smart devices [3], combined with the inherent  ...  These devices come equipped with a broad range of sophisticated embedded sensors such as an accelerometer, gyroscope, GNSS, digital compass, GPS, microphone, light intensity sensor and camera [2] .  ...  However, from an economic standpoint to minimise cost, it can be assumed that the role of money or budget as a constraining factor in adopting incentive mechanism is implied.  ... 
doi:10.1186/s13673-016-0080-3 fatcat:euypyllcvncvbpnnulyxghncfq

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, Zhu Han
2016 arXiv   pre-print
This paper provides a state-of-the-art literature review on economic analysis and pricing models for data collection and wireless communication in Internet of Things (IoT).  ...  Wireless Sensor Networks (WSNs) are the main component of IoT which collect data from the environment and transmit the data to the sink nodes.  ...  However, when the allocated budget is constrained, the number of selected users is strict.  ... 
arXiv:1608.03475v1 fatcat:2jjbf3bw2vai5kqi74r56dviwe

A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling Technologies,and Challenges [article]

Minrui Xu, Wei Chong Ng, Wei Yang Bryan Lim, Jiawen Kang, Zehui Xiong, Dusit Niyato, Qiang Yang, Xuemin Sherman Shen, Chunyan Miao
2022 arXiv   pre-print
communication systems for users to be telepresent and teleoperate in the Metaverse.  ...  cloud-edge-end computation framework driven solutions to realize the Metaverse on resource-constrained edge devices.  ...  and feature Planning mechanisms Virtual Object Pose [98] Shared multi-user AR System implementation and evaluation Accuracy, Virtual Object Pose Jitter and Drift, and Fine-grained control mechanism End-to-end  ... 
arXiv:2203.05471v1 fatcat:ountkueaz5erxdjttpws6gfcbi

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
society, and (2) the increase of IoT/II applications and digital services with growing data collection capabilities are introducing new threats and risks on citizens' privacy.  ...  As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements.  ...  SMC can be suitable for various IoT/II use cases where privacy-preserving computation is needed, e.g., smart metering, voting, auctions, etc.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Digital Public History: bringing the public back in

Serge Noiret
2015 Public History Weekly  
Europeana, which maintains a digital collection of millions of cultural objects from memory institutions all over Europe, released the metadata for its collection under a CC0 licence in 2012.  ...  Migration, which is the most widely used digital preservation strategy, is well suited for static digital objects such as images and text.  ...  Assessments of the Council of Canadian Academies The assessment reports listed below are accessible through the Council's website ( • Leading in the Digital World: Opportunities for  ... 
doi:10.1515/phw-2015-3931 fatcat:3u4eclgbjzh3dmzr2zjdbo5lwe

A Survey on Privacy-preserving Schemes for Smart Grid Communications [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
Specifically, we select and in-detail examine thirty privacy preserving schemes developed for or applied in the context of Smart Grids.  ...  In this paper, we present a comprehensive survey of privacy-preserving schemes for Smart Grid communications.  ...  Following a different approach, authors in [67] and [55] specifically focus on how cloud computing (CC) could be used for energy management, information management and security of the Smart Grid.  ... 
arXiv:1611.07722v1 fatcat:rfw2j642ljajpcwxlaf5q5pmhy

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
Mobile crowdsourcing can be seen as a new paradigm contributing to the development of the IoT.  ...  Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  The authors presented AnonySense, a general architecture focusing on privacy-aware mobile crowdsourcing.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming

Igor Stanojev, Aylin Yener
2013 IEEE Transactions on Wireless Communications  
To facilitate the behavior of non-cooperative and competitive multiple jammers, auctioning and power control mechanisms are applied for a follower sub-game in a two-layer leader-follower game framework  ...  A distributed mechanism is developed that motivates jamming participation of otherwise non-cooperative terminals, by compensating them with an opportunity to use the fraction of legitimate parties' spectrum  ...  Digital Object Identifier 10.1109/TWC.2012.120412.112001 Stackelberg scheme, β = 1 Fig. 8.  ... 
doi:10.1109/twc.2012.120412.112001 fatcat:tpb7xo4hinakfkyzqywqdudoj4

The European University Institute [chapter]

1991 International Handbook of Universities  
Details of the research of the Centre can be found on: The Climate Policy Research Unit (CPRU) is a research group within the Robert Schuman Centre for Advanced Studies under the Loyola de Palacio Chair  ...  The goal of the CPRU is to provide a reliable source for information and analysis of EU climate policy and a forum for discussion of research carried out in this area among government officials, academics  ...  sum of the direct and indirect costs of permit auctioning, divided by the gross value added of a sector. 19 The logic behind CI is that it proxies for the cost burden imposed by full auctioning.  ... 
doi:10.1007/978-1-349-21250-7_118 fatcat:xiv6d6flirfqxpixl7kljr26rm

Federated Learning for Internet of Things: Recent Advances, Taxonomy, and Open Challenges [article]

Latif U. Khan, Walid Saad, Zhu Han, Ekram Hossain, Choong Seon Hong
2021 arXiv   pre-print
The Internet of Things (IoT) will be ripe for the deployment of novel machine learning algorithms for both network and application management.  ...  A set of metrics such as sparsification, robustness, quantization, scalability, security, and privacy, is delineated in order to rigorously evaluate the recent advances.  ...  the learning loss under resource budget constraints. • The performance of the proposed algorithm was evaluated using real-time datasets. • A theoretical convergence bound was derived for federated learning  ... 
arXiv:2009.13012v2 fatcat:4oqifqi5czfyxiqe7gjewmuzsq
« Previous Showing results 1 — 15 out of 1,435 results