Filters








41,692 Hits in 4.3 sec

On Secure Wireless Communications for Service Oriented Computing

Yuanyu Zhang, Yulong Shen, Hua Wang, Yanchun Zhang, Xiaohong Jiang
2018 IEEE Transactions on Services Computing  
Two-hop wireless network serves as the basic net-work model for the study of general wireless networks, while cooperative jamming is a promising scheme to achieve the physi-cal layer security.  ...  For the concerned network, closed form modeling for both SOP and TOP is first conducted based on the Central Limit Theorem.  ...  in modern wireless communications becomes more and more urgent.  ... 
doi:10.1109/tsc.2015.2478453 fatcat:dd4dgz6rmfbsjkvr4l3ktoovbu

Special Issue on Service-Oriented Collaborative Computing and Applications

Jianming Yong, Giancarlo Fortino, Weiming Shen, Yun Yang, Kuo-Ming Chao, Wil van der Aalst
2018 IEEE Transactions on Services Computing  
The fourth paper is titled "On Secure Wireless Communications for Service Oriented Computing". Zhang et al. deliver a new approach on wireless security communications over service oriented computing.  ...  While serviceoriented collaborative computing heavily depends on secure communications channels, especially reliable and trust wireless environment, securing the wireless communications channel becomes  ...  The fourth paper is titled "On Secure Wireless Communications for Service Oriented Computing". Zhang et al. deliver a new approach on wireless security communications over service oriented computing.  ... 
doi:10.1109/tsc.2017.2764559 fatcat:yvp5wk6qvvaj5hrass6x4y5vee

Flexible Service Oriented Network Architecture for Wireless Sensor Networks

Akhilendra Pratap Singh, O.P. Vyas, Shirshu Varma
2014 International Journal of Computers Communications & Control  
This paper deals with these issues of wireless sensor networks, elaborating the need of generalized communication architecture for applications, developers and users, proposing generalized Flexible Service  ...  Complexities of wireless sensor networks are increasing due to the lack of adoption of new services, new protocols and interoperability between heterogeneous services with common communication architecture  ...  Network Architecture for Wireless Sensor Networks 621 platform.  ... 
doi:10.15837/ijccc.2014.5.731 fatcat:tu6z4skoyngshijdoms7ovnaxu

Secure key distribution with salr using wireless sensor network The major factors that lift the competence of Service Oriented Wireless Sensor Networks are Congestion control and transferring data securely. It is desirable to alter the routing and security outlines adaptively in order to retort effectually to the swiftly fluctuating Network State. Adding complexities to the routing and security schemes increases end to end delay which is not acceptable in service oriented wireless sensor networks. In this p ...

2017 International Journal of Latest Trends in Engineering and Technology  
In a class of Wireless Sensor Networks, known as the service oriented Wireless Sensor Networks; Sensors have a specific task, and may not be communicating all the time.  ...  Abstract-The major factors that lift the competence of Service Oriented Wireless Sensor Networks are Congestion control and transferring data securely.  ...  A special kind of Wireless Sensor Network which is service oriented wireless sensor network is used in which real time reliable data delivery is a major requirement.  ... 
doi:10.21172/1.91.07 fatcat:szmsib4mfvh7booqhk53vqwkhy

Design of a Substation Secondary Equipment-Oriented Error Prevention System Using Wireless Communication Technology and Edge Node Cooperation

Yiran Ren, Jian Cheng, Jie Chen
2022 Wireless Communications and Mobile Computing  
Finally, the wireless communication network is designed based on the edge gateway.  ...  In the 60-hour accuracy statistics, the proposed SSE-oriented error P&C&M system reaches an accuracy as high as 84%. Therefore, the proposed SSE-oriented error P&C&M has strong feasibility.  ...  Based on the previous theoretical basis, combined with edge gateway technology and wireless network communication technology, this paper will build 3 Wireless Communications and Mobile Computing an SSE-oriented  ... 
doi:10.1155/2022/6249549 doaj:15b33c90bc9c4d8dbfdbb37bb843f4e2 fatcat:rdedayvemja6ta6xqx2p4kd6ca

Review on Security Challenges on Integrating WNS in Health care Services Networks with Internet of the things

Abubakar Abdulkadir, Badamasi Ja Afar, Abubakar Abdulkadir Lawal, Abubakar Ahmad, Aminu Ja Afar
2021 Zenodo  
The present or review some existing literature on wireless sensor network challenges in health care services, also existing method of integrating Wireless sensor network in the internet of the things and  ...  Cloud Computing and Applications Collaborative applications Communication architectures for pervasive computing Communication systems Computational intelligence Computer and microprocessor-based  ...  Enabling technologies for pervasive systems (e.g., wireless BAN, PAN) Encryption Energy-efficient and green pervasive computing Event-based, publish/subscribe, and message-oriented middleware Evolutionary  ... 
doi:10.5281/zenodo.5501915 fatcat:bydutnjn25h3jgmjp4zzwdbgne

CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)

PETER
2020 Zenodo  
QoS Provisioning Key Management, Trust Establishment in Wireless Networks Security and Privacy issues in Ad Hoc and Sensor Networks Reliability, Resiliency and [...]  ...  been attracting much interest in both academic and industrial communities.  ...  and Theories in Cloud Computing  The Open Cloud: Cloud Computing and Open Source  HPC on Cloud  Map Reduce Techniques & Application SecuritySecurity Techniques for the Cloud  Trust, Security, Privacy  ... 
doi:10.5281/zenodo.4022109 fatcat:ym3oqv3p4rhnhdqorzharw24l4

A Distributed Infrastructure Supporting Personalized Services for the Mobile Web

Claudia Canali, Michele Colajanni, Riccardo Lancellotti, Philip S. Yu
2007 Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007)  
that consider the computational cost of each Web service A distributed infrastructure supporting personalized services for the Mobile Web University of Modena and Reggio Emilia Philip S.  ...  Privacy Need for high performance Computationally expensive Web-based services Use of highly distributed infrastructure Need for privacy High security levels for the nodes of the infrastructure Centralized  ... 
doi:10.1109/wimob.2007.4390860 fatcat:eq3kytweofcnjflz3xm67eciwa

A secure service provisioning framework for cyber physical cloud computing systems [article]

Anees Ara, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan
2015 arXiv   pre-print
Therefore, we propose a Secure Service provisioning architecture for Cyber Physical Cloud Computing Systems (CPCCS), which includes the combination of technologies such as CPS, Cloud Computing and Wireless  ...  Due to the limitation of resources, and in order to improve the efficiency of the CPS systems, they are combined with cloud computing architecture, and are called as Cyber Physical Cloud Computing Systems  ...  It includes Cloud Computing infrastructure, Communication links and Wireless Sensor Network in a top-down hierarchy as shown in Figure 3 .  ... 
arXiv:1611.00374v1 fatcat:4dg5vob7ybdbfl75hotfekcpgq

Demand of Wireless Network and Security in Current Research

Abhishek Prabhakar, Amod Tiwari, Vinay Kumar Pathak
2015 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet.  ...  Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters...  ...  Most users exploit the network for websurfing, session-oriented activities and chat-oriented activities.  ... 
doi:10.24297/ijct.v14i6.1918 fatcat:fzy3hrhtsrfxthaj3d5r34cwgi

Editorial: Special Issue on "Trustworthy and Intelligent Services for Ubiquitous Computing"

Young-Sik Jeong, Han-Chieh Chao, Mieso Denko, Charalampos Z. Patrikakis
2009 Wireless personal communications  
Therefore, much more attention and effort should be focused on the trustworthy and intelligent ubiquitous applications and services in wireless personal communication environments.  ...  Ubiquitous Computing (UC) has emerged rapidly as an exciting new computing paradigm and includes pervasive, grid, and peer-to-peer computing including sensor networks to provide computing and communication  ...  They describe a dynamic resource management mechanism for computer intelligent communication networks on the basis of an adapting BP neural network control technique.  ... 
doi:10.1007/s11277-009-9885-y fatcat:wiwwwjfjlreuvoys3dkvmxysza

Special Issue on "Recent Trends on Convergence Personal Wireless System"

Joong-Kyung Ryu, Junseok Yoo, Jung-Soo Han, Sang Yeob Oh, Kuinam J. Kim
2013 Wireless personal communications  
Welcome to the special issue of Wireless Personal Communications.  ...  in industrial computing environments and providing high-demand technology.  ...  Personal CommunicationsWireless Communications and Networking • Information System for Personal Computing • Digital Management for Personal CommunicationsWireless Personal Communications and Appliances  ... 
doi:10.1007/s11277-013-1227-4 fatcat:fcq4b5umkzb4hes7ygxnmplknq

Key issues for the design and development of mobile commerce services and applications

Andreas S. Andreou, Costantinos Leonidou, Chrysostomos Chrysostomou, Andreas Pitsillides, George Samaras, Christos N. Schizas, Stephanos M. Mavromous
2005 International Journal of Mobile Communications  
This paper suggests a new approach for developing m-commerce services and applications based on a scheme that divides m-applications into directory-and transaction-oriented classes, identifies mobile user  ...  requirements, and takes into consideration the constraints of current technologies for mobile and wireless computing.  ...  The WTLS (Wireless Transport Layer Security) protocol guarantees security for the agency's customers.  ... 
doi:10.1504/ijmc.2005.006586 fatcat:kxixignoszey7axvnuyamt5gpq

Exploration and Application of AI in 6G Field [article]

Renhao Xue, Jialei Tan, Yutao Shi
2022 arXiv   pre-print
The recent upsurge of diversified mobile applications, especially those supported by AI, is spurring heated discussions on the future evolution of wireless communications.  ...  In particular, 6G will go beyond mobile Internet and will be required to support AI services.  ...  Due to the limitation of Shannon limit, it is difficult to improve the spectral efficiency Computation Oriented Communications (COC): New smart devices call for distributed computation to enable the key  ... 
arXiv:2207.13382v3 fatcat:ccffcieem5ewbcbwgw464upx64

Edge and fog services

Kuo-Ming Chao, Jen-Yao Chung
2019 Service Oriented Computing and Applications  
A service model for fog computing could potentially address the above issues by introducing a new service-oriented architecture, demonstrating the advantage of cloud and distributing computing [3] .  ...  A network of edges or fog, for examples, could rely on wired or wireless network and be powered either by battery with various durations and limits, or by mains power.  ...  A service model for fog computing could potentially address the above issues by introducing a new service-oriented architecture, demonstrating the advantage of cloud and distributing computing [3] .  ... 
doi:10.1007/s11761-019-00256-y fatcat:wsodyv5wxrcuhiu5d56aobvkie
« Previous Showing results 1 — 15 out of 41,692 results