21 Hits in 6.3 sec

A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets

Bruno Cruz, Silvana Gómez-Meire, David Ruano-Ordás, Helge Janicke, Iryna Yevseyeva, Jose R. Méndez
2019 Scientific Programming  
low impact on network packet throughput.  ...  This idea fascinated people and originated a boom of IoT devices together with an increasing demand that was difficult to support.  ...  Ruano-Ordás was supported by a postdoctoral fellowship from Xunta de Galicia (ED481B 2017/018).  ... 
doi:10.1155/2019/9067512 fatcat:zwcaykmzabavjbjsyaak6oci5a

IPFS and Blockchain Based Reliability and Availability Improvement for Integrated Rivers' Streamflow Data

Muhammad Hussain Mughal, Zubair Ahmed Shaikh, Khurshed Ali, Safdar Ali, Saif Hassan
2022 IEEE Access  
The aggregated streamflow records are stored on a streamflow ledger, a Hyperledger fabric-based ledger for rivers' streamflow data.  ...  In a nutshell, the blockchain technology with IPFS for off-chain large files storage would contribute twofold to irrigation systems and flood mitigation domains.  ...  IPFS-based P2P file system maintains Distributed Hash Table (DHT) .  ... 
doi:10.1109/access.2022.3178728 fatcat:chnxw4o7e5gvvpws76dfm2gfhy

Searching 100M Images by Content Similarity

Paolo Bolettieri, Fabrizio Falchi, Claudio Lucchese, Yosi Mass, Raffaele Perego, Fausto Rabitti, Michal Shmueli-Scheuer
2009 Italian Research Conference on Digital Library Management Systems  
A special DLS for management of enhanced publication objects, intended as graphs of digital objects consisting of one publication object, with zero or one Dublin Core metadata record description and with  ...  The Digital Library community has not yet reached a formal agreement on the detailed functionality these systems must implement in terms of content management support.  ...  Acknowledgments The authors are grateful to Maristella Agosti and Giorgio Maria Di Nunzio for the fruitful discussions on the topic of this paper.  ... 
dblp:conf/ircdl/BolettieriFLMPRS09 fatcat:k3n4ffi4bfbwjgyooga22rummq

LH*RS---a highly-available scalable distributed data structure

Witold Litwin, Rim Moussa, Thomas Schwarz
2005 ACM Transactions on Database Systems  
An LH * RS file is hash partitioned over the distributed RAM of a multicomputer, for example, a network of PCs, and supports the unavailability of any k ≥ 1 of its server nodes.  ...  The capabilities of LH * RS offer new perspectives to data intensive applications, including the emerging ones of grids and of P2P computing.  ...  Our network was a 1 Gbps Ethernet.  ... 
doi:10.1145/1093382.1093386 fatcat:kfzqgb6vjbcdhlrinv3jyavzjy

Open Knowledge: Promises and Challenges [chapter]

Rufus Pollock, Jo Walsh
2012 The Digital Public Domain: Foundations for an Open Culture  
fashion, via email or P2P networks.  ...  While some years ago legitimate commercial media offers were absent from the Internet, and media content was shared via peer-to-peer (P2P) file-sharing networks, companies today appear to have figured  ...  CC recommends exposing a mechanism to extract the CC REL abstract model from the XML, so that CC tools need not know about every possible XML schema ahead of time.  ... 
doi:10.11647/obp.0019.07 fatcat:r3yre7bnmndbvbhggtzvdhdyaq

Theory and practice of online learning

Jan van Bruggen
2005 British Journal of Educational Technology  
to replicate after completion.  ...  While P2P software and services have been considered mainly as a means of downloading music files, the technology and goals behind the peer-to-peer concept allow for much more wide-ranging uses.  ...  For instance, one strategy would be to argue one particular point of view for a given topic, then counterbalance this with a somewhat opposing viewpoint.  ... 
doi:10.1111/j.1467-8535.2005.00445_1.x fatcat:52bxo5l2d5dwxjjcenzyawuf7m

Theory and Practice of Online Learning

Morten Paulsen
2004 International Review of Research in Open and Distance Learning  
He holds a Bachelor of Arts (Honours) degree from the University of Alberta and has worked extensively as an editor and writer on an array of electronic and print-based publishing projects.  ...  Vincent Ambrock works as a Multimedia Instructional Design Editor in the Athabasca University School of Business.  ...  to replicate after completion.  ... 
doi:10.19173/irrodl.v5i3.200 fatcat:mkuyazma6vd3llklmtzhwtlzsu

Disegno Journal of Design Culture Editorial

Megan Blissick, Belinda, Deanna Herst
Aims and Scope Disegno publishes original research papers, essays, reviews on all possible aspects of design cultures.  ...  are explained and understood by the interpretation strategies of narrative disciplines. naturally, this Aristotelian model (in the sense of Victor Margolin)-that echoes the triad of theoria, praxis and  ...  Another strategy of rapid production in the productive structure, relying on an elastic and decentralized distribution network.  ... 

Abstracts of Papers Presented at the 2005 Pittsburgh Conference

Peter B. Stockwell
2005 Journal of automated methods & management in chemistry (Print)  
The information presented to the attendees was also lacking and many companies' details were missing from the final program book, an omission no doubt on their behalf—my company was one of these—however  ...  So the Pittsburgh Conference show moves on, and again next year it will be held in Orlando from 12 March to 17 March 2006.  ...  The submitted manuscript has been authored by a contractor of the  ... 
doi:10.1155/jammc.2005.59 pmid:18924631 pmcid:PMC2548401 fatcat:xqreduq3ibdwdkzh4l7xtj4f3e

Amateurism and the Aesthetics of Lego Stop-Motion on YouTube

Shannon Brownlee
2016 Film Criticism  
Emulation as a strategy may yet come full circle.  ...  of computer-assisted reading and writing -what Alain Giffard now calls "industrial reading" 8 -where a sound file and an image file are "read" simultaneously.  ...  Instead of a political strategy, we are presented with a series of extremely similar, striking videos of incoherent fragments of fights with a new enemy, distracting the audience not only from real politics  ... 
doi:10.3998/fc.13761232.0040.204 fatcat:2zepfcqf4fgltb4il3cuh2pudi

ICIW 2013 Committee ICIW Advisory Committee ICIW 2013 Technical Program Committee

Marek Rychly, Steffen Fries, Vagan Terziyan, Steffen Fries, Vagan Terziyan, Charlie Abela, Markus Aleksy, Giner Alor Hernandez, Instituto Tecnologico De Orizaba -Veracruz, México Feda, Alshahwan, Liliana Ardissono (+122 others)
a series of co-located events that covered the complementary aspects related to designing and deploying of applications based on IP&Web techniques and mechanisms.  ...  Special Web Services based applications such as e-Commerce, e-Business, P2P, multimedia, and GRID enterprise-related, allow design flexibility and easy to develop new services.  ...  ACKNOWLEDGMENT The research presented in this paper was supported by project No. 264207, ERRIC-Empowering Romanian Research on Intelligent Information Technologies/FP7-REGPOT-2010-1.  ... 

Telechain: Bridging Telecom Policy and Blockchain Practice [article]

Sudheesh Singanamalla
2022 pre-print
In this paper, we provide a holistic account of of the projects' evolution from (1) its design and strategy, to (2) regulatory and policy action, (3) country wide implementation and deployment, and (4)  ...  a blockchain/distributed ledgers in addressing the UCC problem.  ...  We'd like to acknowledge the valuable feedback provided on the paper by the anonymous reviewers, Waylon Brunette, Matthew Johnson, Miranda Wei, Ananditha Raghunath, and members of the ICTD Lab at the University  ... 
doi:10.1145/3530190.3534820 arXiv:2205.12350v1 fatcat:kfjxdcxodvdani4o64z53gw5la

Availability by Design: Practical Denial-of-Service-Resilient Distributed Wireless Networks

Milan Stute
As a research community, we need to protect those new applications that—as we find—can be mapped to a total of three distinct networking scopes: neighbor, island, and archipelago.  ...  Distributed wireless networks (DWNs) where devices communicate directly without relying on Internet infrastructure are on the rise, driving new applications and paradigms such as multimedia, authentication  ...  It is When the owner leaves, the remaining nodes need to re-establish a Wi-Fi P2P group. not possible to migrate the role of the GO to another device: if the GO leaves the network, a new network must be  ... 
doi:10.25534/tuprints-00011457 fatcat:aacczmwzpfdubj6ve5pofzvzf4

OASIcs, Volume 17, KiVS'11, Complete Volume [article]

Norbert Luttenberger, Hagen Peters
In an advanced form this attack even allows to identify a user-i.e. learning his name, address etc.-by analyzing the sites a user has visited [5].  ...  Acknowledgements The authors would like to thank Deutsche Forschungsgemeinschaft (DFG) for supporting this work through a joint research project on "Self-organization based on decentralized co-ordination  ...  In order to guarantee high scalability and robustness it is built upon a structured P2P overlay network.  ... 
doi:10.4230/oasics.kivs.2011 fatcat:tf3jwio36jd77njb3uje6snygm

Middleware and Application Management Architecture [article]

Sven Van Der Meer, Technische Universität Berlin, Technische Universität Berlin, Radu Popescu-Zeletin
This thesis describes a new approach for the integrated management of distributed networks, services, and applications.  ...  It focuses on middleware for management, control, and use of fully distributed resources.  ...  Ad-hoc networking and P2P communication need lookup services to search for objects that offer a specific functionality.  ... 
doi:10.14279/depositonce-595 fatcat:yfmsmpnar5aobjgowjahq3hrwi
« Previous Showing results 1 — 15 out of 21 results