GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Hindawi Limited  (11)
  • 2015-2019  (11)
  • 1
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Scientific Programming Vol. 2018 ( 2018-09-02), p. 1-2
    In: Scientific Programming, Hindawi Limited, Vol. 2018 ( 2018-09-02), p. 1-2
    Type of Medium: Online Resource
    ISSN: 1058-9244 , 1875-919X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hindawi Limited ; 2015
    In:  Mobile Information Systems Vol. 2015 ( 2015), p. 1-10
    In: Mobile Information Systems, Hindawi Limited, Vol. 2015 ( 2015), p. 1-10
    Abstract: With the rapid development of mobile wireless networks such as 4G and LET, ever more mobile services and applications are emerging in mobile networks. Faced with massive mobile services, a top priority of mobile information systems is how to find the best services and compose them into new value-added services (e.g., location-based services). Hence, service selection is one of the most fundamental operations in mobile information systems. Traditional implementation of service selection suffers from the problems of a huge number of services and reliability. We present an efficient approach to service selection based on computing QoS uncertainty that achieves the best solution in two senses: (1) the time cost for finding the best services is short and (2) the reliability of the selected services is high. We have implemented our approach in experiments with real-world and synthetic datasets. Our results show that our approach improves on the other approaches tested.
    Type of Medium: Online Resource
    ISSN: 1574-017X , 1875-905X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2015
    detail.hit.zdb_id: 2187808-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2019
    In:  Wireless Communications and Mobile Computing Vol. 2019 ( 2019-02-24), p. 1-19
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2019 ( 2019-02-24), p. 1-19
    Abstract: A new networking paradigm, Vehicular Edge Computing (VEC), has been introduced in recent years to the vehicular network to augment its computing capacity. The ultimate challenge to fulfill the requirements of both communication and computation is increasingly prominent, with the advent of ever-growing modern vehicular applications. With the breakthrough of VEC, service providers directly host services in close proximity to smart vehicles for reducing latency and improving quality of service (QoS). This paper illustrates the VEC architecture, coupled with the concept of the smart vehicle, its services, communication, and applications. Moreover, we categorized all the technical issues in the VEC architecture and reviewed all the relevant and latest solutions. We also shed some light and pinpoint future research challenges. This article not only enables naive readers to get a better understanding of this latest research field but also gives new directions in the field of VEC to the other researchers.
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2019
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Wireless Communications and Mobile Computing Vol. 2018 ( 2018), p. 1-10
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2018 ( 2018), p. 1-10
    Abstract: Fog computing, as the supplement of cloud computing, can provide low-latency services between mobile users and the cloud. However, fog devices may encounter security challenges as a result of the fog nodes being close to the end users and having limited computing ability. Traditional network attacks may destroy the system of fog nodes. Intrusion detection system (IDS) is a proactive security protection technology and can be used in the fog environment. Although IDS in tradition network has been well investigated, unfortunately directly using them in the fog environment may be inappropriate. Fog nodes produce massive amounts of data at all times, and, thus, enabling an IDS system over big data in the fog environment is of paramount importance. In this study, we propose an IDS system based on decision tree. Firstly, we propose a preprocessing algorithm to digitize the strings in the given dataset and then normalize the whole data, to ensure the quality of the input data so as to improve the efficiency of detection. Secondly, we use decision tree method for our IDS system, and then we compare this method with Naïve Bayesian method as well as KNN method. Both the 10% dataset and the full dataset are tested. Our proposed method not only completely detects four kinds of attacks but also enables the detection of twenty-two kinds of attacks. The experimental results show that our IDS system is effective and precise. Above all, our IDS system can be used in fog computing environment over big data.
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Wireless Communications and Mobile Computing Vol. 2018 ( 2018-06-27), p. 1-3
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2018 ( 2018-06-27), p. 1-3
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hindawi Limited ; 2016
    In:  Mobile Information Systems Vol. 2016 ( 2016), p. 1-10
    In: Mobile Information Systems, Hindawi Limited, Vol. 2016 ( 2016), p. 1-10
    Abstract: Anomaly detection is critical for intelligent vehicle (IV) collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs). In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs). Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.
    Type of Medium: Online Resource
    ISSN: 1574-017X , 1875-905X
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2016
    detail.hit.zdb_id: 2187808-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Wireless Communications and Mobile Computing Vol. 2018 ( 2018-06-19), p. 1-8
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2018 ( 2018-06-19), p. 1-8
    Abstract: In order to build highly reliable composite service via Service Oriented Architecture (SOA) in the Mobile Fog Computing environment, various fault tolerance strategies have been widely studied and got notable achievements. In this paper, we provide a comprehensive overview of key fault tolerance strategies. Firstly, fault tolerance strategies are categorized into static and dynamic fault tolerance according to the phase of their adoption. Secondly, we review various static fault tolerance strategies. Then, dynamic fault tolerance implementation mechanisms are analyzed. Finally, main challenges confronted by fault tolerance for composite service are reviewed.
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Wireless Communications and Mobile Computing Vol. 2018 ( 2018), p. 1-22
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2018 ( 2018), p. 1-22
    Abstract: A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes) at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid) will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Hindawi Limited ; 2018
    In:  Wireless Communications and Mobile Computing Vol. 2018 ( 2018-11-13), p. 1-2
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2018 ( 2018-11-13), p. 1-2
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2018
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Hindawi Limited ; 2019
    In:  Wireless Communications and Mobile Computing Vol. 2019 ( 2019-12-23), p. 1-20
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2019 ( 2019-12-23), p. 1-20
    Abstract: With the explosive growth of mobile applications, mobile devices need to be equipped with abundant resources to process massive and complex mobile applications. However, mobile devices are usually resource-constrained due to their physical size. Fortunately, mobile edge computing, which enables mobile devices to offload computation tasks to edge servers with abundant computing resources, can significantly meet the ever-increasing computation demands from mobile applications. Nevertheless, offloading tasks to the edge servers are liable to suffer from external security threats (e.g., snooping and alteration). Aiming at this problem, we propose a security and cost-aware computation offloading (SCACO) strategy for mobile users in mobile edge computing environment, the goal of which is to minimize the overall cost (including mobile device’s energy consumption, processing delay, and task loss probability) under the risk probability constraints. Specifically, we first formulate the computation offloading problem as a Markov decision process (MDP). Then, based on the popular deep reinforcement learning approach, deep Q-network (DQN), the optimal offloading policy for the proposed problem is derived. Finally, extensive experimental results demonstrate that SCACO can achieve the security and cost efficiency for the mobile user in the mobile edge computing environment.
    Type of Medium: Online Resource
    ISSN: 1530-8669 , 1530-8677
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2019
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...