29 Hits in 4.6 sec

SMTP: An Optimized Storage Method for Vehicle Trajectory Data Exploiting Trajectory Patterns

Hailun Wang, Mingming Zhang, Renyu Yang, Xuelian Lin, Tianyu Wo, Rajiv Ranjan, Jie Xu
2016 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)  
In this paper we present SMTP, a new storage method based on the recognition of trajectory patterns to reduce the storage space for the trajectory data.  ...  A combinatorial optimization algorithm is then introduced to decide which trajectory patterns should be used for trajectory storage, thereby removing redundant data and saving space.  ...  patterns for roads in each trajectory; • An implementation of a holistic data storage method that mitigates the storage redundancies and accelerates queries based on trajectory patterns.  ... 
doi:10.1109/hpcc-smartcity-dss.2016.0112 dblp:conf/hpcc/WangZYLWRX16 fatcat:rh2i2l3mabhwdbdpaig5qal3ka

From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks

Paulo Rogerio Pereira, Augusto Casaca, Joel J. P. C. Rodrigues, Vasco N. G. J. Soares, Joan Triay, Cristina Cervello-Pastor
2012 IEEE Communications Surveys and Tutorials  
This paper provides an introductory overview of Vehicular Delay-Tolerant Networks. First, an introduction to Delay-Tolerant Networks and Vehicular Delay-Tolerant Networks is given.  ...  and protocols can help in situations where network connectivity is sparse or with large variations in density, or even when there is no end-to-end connectivity by providing a communications solution for  ...  So, an application-layer proxy for SMTP behaves like an SMTP server (to SMTP clients), responding with the appropriate SMTP protocol responses, gathering all information related to a mail message and building  ... 
doi:10.1109/surv.2011.081611.00102 fatcat:nqpkmg6fnfabppz56wa3iinhzu

A/B Testing [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
of an "ideal" trajectory.  ...  to determine an optimal policy for all the states.  ...  A exploiting the known part of the MDP and optimally trying to reach the unknown part of the MDP (exploration) .  ... 
doi:10.1007/978-1-4899-7687-1_100507 fatcat:bg6sszljsrax5heho4glbcbicu

Average-Payoff Reinforcement Learning [chapter]

2017 Encyclopedia of Machine Learning and Data Mining  
of an "ideal" trajectory.  ...  to determine an optimal policy for all the states.  ...  A exploiting the known part of the MDP and optimally trying to reach the unknown part of the MDP (exploration) .  ... 
doi:10.1007/978-1-4899-7687-1_100029 fatcat:jub4ulyg45abnf4qgutimczie4

Geospatial Information Processing Technologies [chapter]

Zhenlong Li, Zhipeng Gui, Barbara Hofer, Yan Li, Simon Scheider, Shashi Shekhar
2019 Manual of Digital Earth  
The increasing availability of geospatial data offers great opportunities for advancing scientific discovery and practices in society.  ...  Effective and efficient processing of geospatial data is essential for a wide range of Digital Earth applications such as climate change, natural hazard prediction and mitigation, and public health.  ...  Spatial DBMSs are an essential component of spatial data storage and management for geospatial information processing.  ... 
doi:10.1007/978-981-32-9915-3_6 fatcat:mpkjqn6orzciziaaxkbntenheu


2021 2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)  
This paper proposes an optimization problem which minimizes storages capacity based on system conditions.  ...  The IoT ThingSpeak platform is used for data storage and processing in the cloud.  ... 
doi:10.1109/icce-tw52618.2021.9602919 fatcat:aetmvxb7hfah7iuucbamos2wgu

Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges

Maurice J. Khabbaz, Chadi M. Assi, Wissam F. Fawaz
2012 IEEE Communications Surveys and Tutorials  
Data transmission rates become highly asymmetric and links highly error prone.  ...  Based on this assumption, buffer sizes are relatively small and optimized in such a way to keep a low overall packet drop rate due to buffer overload.  ...  However, it is worthwhile to note that connectivity patterns differ from one vehicle type to another (e.g. bus, car, truck, metro, train, plane, boat, etc.).  ... 
doi:10.1109/surv.2011.041911.00093 fatcat:isxq2w2ppjgp3bfxu7bbfwcmli

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [article]

Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
2021 arXiv   pre-print
honeypots and honeynets for IoT, IIoT, and CPS environments.  ...  It provides a taxonomy and extensive analysis of the existing honeypots and honeynets, states key design factors for the state-of-the-art honeypot/honeynet research and outlines open issues for future  ...  Although research honeypots are important to understand the attacks and new tactics of attackers, they do not actively participate in securing an IoT, IIoT, or CPS environment.  ... 
arXiv:2108.02287v1 fatcat:l4b23mylyfd6xjtfhrtsrin3zq

International Journal of Computer Science July 2021

2021 Zenodo  
See authors guide for manuscript preparation and submission guidelines.  ...  CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2021 Issues The topics suggested by this issue can be discussed in term of concepts, surveys  ...  For the first step, classifying so varied and complex user activities, they used the k-pattern clustering algorithm, an efficient unsupervised learning method.  ... 
doi:10.5281/zenodo.5543977 fatcat:vxk2ynl3l5bbpcvpda2lt4qef4

Novel mediator architectures for Grid information systems

Alexander Wöhrer, Peter Brezany, A. Min Tjoa
2005 Future generations computer systems  
a Virtual Data Source -a clean abstraction of heterogeneous/distributed data for users and applications.  ...  Several technical obstacles arise in the design and implementation of a system for integration of such data sources, most notably distribution, autonomy, and data heterogeneity.  ...  Scientists foresee -and indeed, we are experiencing -a similar trajectory for Grid technologies [FK98] .  ... 
doi:10.1016/j.future.2004.09.018 fatcat:awe7tjxqpzbcpojgly256mw3lq

Service Provider DevOps network capabilities and tools [article]

Rebecca Steinert, Wolfgang John, Pontus Sköldström, Bertrand Pechenot, András Gulyás, István Pelle, Tamás Lévai, Felicián Németh, Juhoon Kim, Catalin Meirosu, Xuejun Cai, Chunyan Fu (+11 others)
2015 arXiv   pre-print
The concept is further exemplified in a case study for deployment and scaling of an Elastic Firewall.  ...  This report provides an understanding of how the UNIFY Service Provider (SP)-DevOps concept can be applied and integrated with a combined cloud and transport network NFV architecture.  ...  We plan to extend this tool to verify paths or trajectories taken by packets in the data plane as well. 5.11.1 Technical description All kinds of application-traffic like HTTP, SMTP, VOIP etc have their  ... 
arXiv:1510.02818v2 fatcat:3ldre26zznhzpmq5dboz374hbi

Designing an Internet Traffic Predictive Model by Applying a Signal Processing Method

Soo-Yeon Ji, Seonho Choi, Dong Hyun Jeong
2014 Journal of Network and Systems Management  
Yet achieving the optimal balance between data privacy and utility needs has been documented as an NP-hard challenge.  ...  Nevertheless, during the process of data privatization, the utility or usefulness of the privatized data diminishes.  ...  In particular, we are grateful to Harry Hochheiser, Mike O'Leary, Shiva Azadegan, AC Chaplin, Patricia Gregory, Jack McLaughlin for their contributions.  ... 
doi:10.1007/s10922-014-9335-3 fatcat:luaehrjrtjhtlj6osufvxyhmxy

Towards a global participatory platform

S. Buckingham Shum, K. Aberer, A. Schmidt, S. Bishop, P. Lukowicz, S. Anderson, Y. Charalabidis, J. Domingue, S. de Freitas, I. Dunwell, B. Edmonds, F. Grey (+8 others)
2012 The European Physical Journal Special Topics  
within the system, serving the functions of (i) sensing the environment in order to pool data, (ii) mining the resulting data for patterns in order to model the past/present/future, and (iii) sharing  ...  The FuturICT project seeks to use the power of big data, analytic models grounded in complexity science, and the collective intelligence they yield for societal benefit.  ...  It also follows that one of the most promising research trajectories for the GPP will concern theories and technologies which amplify our capacity to detect significant patterns in the usage of the platform  ... 
doi:10.1140/epjst/e2012-01690-3 fatcat:eqbwhblv3jeztjragvf4uuhb6i

Internet of Intelligence: A Survey on the Enabling Technologies, Applications, and Challenges [article]

Qinqin Tang, F. Richard Yu, Renchao Xie, Azzedine Boukerche, Tao Huang, Yunjie Liu
2022 pre-print
Finally, some technical challenges and open issues are summarized to fully exploit the benefits of the Internet of intelligence.  ...  The Internet of intelligence is conceived as an emerging networking paradigm, which will make intelligence as easy to obtain as information.  ...  through the adoption of edge computing and surveyed the application, inference, training and optimization methods for edge intelligence.  ... 
doi:10.1109/comst.2022.3175453 arXiv:2205.08977v1 fatcat:3n5vjuvj4zb7pehrjvxsjh3xpe

Application Platforms, Routing Algorithms and Mobility Behavior in Mobile Disruption-Tolerant Networks

Arezu M. Moghadam
Using these traces, we employ a Markovian approach to extract inherent patterns in human mobility. We design and implement a new routing algorithm for mobile DTNs based on our M [...]  ...  PEEP considers mobile users' interests and global popularity of data items in its routing decisions to route data toward the community of mobile users who are interested in that data content.  ...  data in storage, and wait for new contact opportunities to transfer that data to other mobile nodes.  ... 
doi:10.7916/d8fj2prg fatcat:g43ro6ywjjh4dl3qkt5moswoua
« Previous Showing results 1 — 15 out of 29 results