A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
SMTP: An Optimized Storage Method for Vehicle Trajectory Data Exploiting Trajectory Patterns
2016
2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
In this paper we present SMTP, a new storage method based on the recognition of trajectory patterns to reduce the storage space for the trajectory data. ...
A combinatorial optimization algorithm is then introduced to decide which trajectory patterns should be used for trajectory storage, thereby removing redundant data and saving space. ...
patterns for roads in each trajectory; • An implementation of a holistic data storage method that mitigates the storage redundancies and accelerates queries based on trajectory patterns. ...
doi:10.1109/hpcc-smartcity-dss.2016.0112
dblp:conf/hpcc/WangZYLWRX16
fatcat:rh2i2l3mabhwdbdpaig5qal3ka
From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks
2012
IEEE Communications Surveys and Tutorials
This paper provides an introductory overview of Vehicular Delay-Tolerant Networks. First, an introduction to Delay-Tolerant Networks and Vehicular Delay-Tolerant Networks is given. ...
and protocols can help in situations where network connectivity is sparse or with large variations in density, or even when there is no end-to-end connectivity by providing a communications solution for ...
So, an application-layer proxy for SMTP behaves like an SMTP server (to SMTP clients), responding with the appropriate SMTP protocol responses, gathering all information related to a mail message and building ...
doi:10.1109/surv.2011.081611.00102
fatcat:nqpkmg6fnfabppz56wa3iinhzu
A/B Testing
[chapter]
2017
Encyclopedia of Machine Learning and Data Mining
of an "ideal" trajectory. ...
to determine an optimal policy for all the states. ...
A exploiting the known part of the MDP and optimally trying to reach the unknown part of the MDP (exploration) . ...
doi:10.1007/978-1-4899-7687-1_100507
fatcat:bg6sszljsrax5heho4glbcbicu
Average-Payoff Reinforcement Learning
[chapter]
2017
Encyclopedia of Machine Learning and Data Mining
of an "ideal" trajectory. ...
to determine an optimal policy for all the states. ...
A exploiting the known part of the MDP and optimally trying to reach the unknown part of the MDP (exploration) . ...
doi:10.1007/978-1-4899-7687-1_100029
fatcat:jub4ulyg45abnf4qgutimczie4
Geospatial Information Processing Technologies
[chapter]
2019
Manual of Digital Earth
The increasing availability of geospatial data offers great opportunities for advancing scientific discovery and practices in society. ...
Effective and efficient processing of geospatial data is essential for a wide range of Digital Earth applications such as climate change, natural hazard prediction and mitigation, and public health. ...
Spatial DBMSs are an essential component of spatial data storage and management for geospatial information processing. ...
doi:10.1007/978-981-32-9915-3_6
fatcat:mpkjqn6orzciziaaxkbntenheu
Program
2021
2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
This paper proposes
an optimization problem which minimizes storages capacity based on system conditions. ...
The IoT ThingSpeak platform is used for data storage and processing in the cloud. ...
doi:10.1109/icce-tw52618.2021.9602919
fatcat:aetmvxb7hfah7iuucbamos2wgu
Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges
2012
IEEE Communications Surveys and Tutorials
Data transmission rates become highly asymmetric and links highly error prone. ...
Based on this assumption, buffer sizes are relatively small and optimized in such a way to keep a low overall packet drop rate due to buffer overload. ...
However, it is worthwhile to note that connectivity patterns differ from one vehicle type to another (e.g. bus, car, truck, metro, train, plane, boat, etc.). ...
doi:10.1109/surv.2011.041911.00093
fatcat:isxq2w2ppjgp3bfxu7bbfwcmli
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
[article]
2021
arXiv
pre-print
honeypots and honeynets for IoT, IIoT, and CPS environments. ...
It provides a taxonomy and extensive analysis of the existing honeypots and honeynets, states key design factors for the state-of-the-art honeypot/honeynet research and outlines open issues for future ...
Although research honeypots are important to understand the attacks and new tactics of attackers, they do not actively participate in securing an IoT, IIoT, or CPS environment. ...
arXiv:2108.02287v1
fatcat:l4b23mylyfd6xjtfhrtsrin3zq
International Journal of Computer Science July 2021
2021
Zenodo
See authors guide for manuscript preparation and submission guidelines. ...
CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2021 Issues The topics suggested by this issue can be discussed in term of concepts, surveys ...
For the first step, classifying so varied and complex user activities, they used the k-pattern clustering algorithm, an efficient unsupervised learning method. ...
doi:10.5281/zenodo.5543977
fatcat:vxk2ynl3l5bbpcvpda2lt4qef4
Novel mediator architectures for Grid information systems
2005
Future generations computer systems
a Virtual Data Source -a clean abstraction of heterogeneous/distributed data for users and applications. ...
Several technical obstacles arise in the design and implementation of a system for integration of such data sources, most notably distribution, autonomy, and data heterogeneity. ...
Scientists foresee -and indeed, we are experiencing -a similar trajectory for Grid technologies [FK98] . ...
doi:10.1016/j.future.2004.09.018
fatcat:awe7tjxqpzbcpojgly256mw3lq
Service Provider DevOps network capabilities and tools
[article]
2015
arXiv
pre-print
The concept is further exemplified in a case study for deployment and scaling of an Elastic Firewall. ...
This report provides an understanding of how the UNIFY Service Provider (SP)-DevOps concept can be applied and integrated with a combined cloud and transport network NFV architecture. ...
We plan to extend this tool to verify paths or trajectories taken by packets in the data plane as well. 5.11.1 Technical description All kinds of application-traffic like HTTP, SMTP, VOIP etc have their ...
arXiv:1510.02818v2
fatcat:3ldre26zznhzpmq5dboz374hbi
Designing an Internet Traffic Predictive Model by Applying a Signal Processing Method
2014
Journal of Network and Systems Management
Yet achieving the optimal balance between data privacy and utility needs has been documented as an NP-hard challenge. ...
Nevertheless, during the process of data privatization, the utility or usefulness of the privatized data diminishes. ...
In particular, we are grateful to Harry Hochheiser, Mike O'Leary, Shiva Azadegan, AC Chaplin, Patricia Gregory, Jack McLaughlin for their contributions. ...
doi:10.1007/s10922-014-9335-3
fatcat:luaehrjrtjhtlj6osufvxyhmxy
Towards a global participatory platform
2012
The European Physical Journal Special Topics
within the system, serving the functions of (i) sensing the environment in order to pool data, (ii) mining the resulting data for patterns in order to model the past/present/future, and (iii) sharing ...
The FuturICT project seeks to use the power of big data, analytic models grounded in complexity science, and the collective intelligence they yield for societal benefit. ...
It also follows that one of the most promising research trajectories for the GPP will concern theories and technologies which amplify our capacity to detect significant patterns in the usage of the platform ...
doi:10.1140/epjst/e2012-01690-3
fatcat:eqbwhblv3jeztjragvf4uuhb6i
Internet of Intelligence: A Survey on the Enabling Technologies, Applications, and Challenges
[article]
2022
pre-print
Finally, some technical challenges and open issues are summarized to fully exploit the benefits of the Internet of intelligence. ...
The Internet of intelligence is conceived as an emerging networking paradigm, which will make intelligence as easy to obtain as information. ...
through the adoption of edge computing and surveyed the application, inference, training and optimization methods for edge intelligence. ...
doi:10.1109/comst.2022.3175453
arXiv:2205.08977v1
fatcat:3n5vjuvj4zb7pehrjvxsjh3xpe
Application Platforms, Routing Algorithms and Mobility Behavior in Mobile Disruption-Tolerant Networks
2017
Using these traces, we employ a Markovian approach to extract inherent patterns in human mobility. We design and implement a new routing algorithm for mobile DTNs based on our M [...] ...
PEEP considers mobile users' interests and global popularity of data items in its routing decisions to route data toward the community of mobile users who are interested in that data content. ...
data in storage, and wait for new contact opportunities to transfer that data to other mobile nodes. ...
doi:10.7916/d8fj2prg
fatcat:g43ro6ywjjh4dl3qkt5moswoua
« Previous
Showing results 1 — 15 out of 29 results