GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Description / Table of Contents: This book covers the combination of technologies which enables the transformation of everyday objects into smart objects, creating a paradigm that connects the real world with the digital world. Discusses progress made thus far, and emerging innovations.
    Type of Medium: Online Resource
    Pages: 1 online resource (444 pages)
    Edition: 1st ed.
    ISBN: 9783642350160
    Series Statement: Studies in Computational Intelligence Series ; v.495
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Contributors -- 1 Internet of Intelligent Things: Bringing Artificial Intelligence into Things and Communication Networks -- Abstract -- 1…Introduction -- 1.1 Internet of Things Challenges -- 2…Artificial Intelligence for Intelligent Sensing -- 3…Social Networks and the Internet of Intelligent Things -- 4…Pervasive Intelligent Robots -- 4.1 IoT and Urban Technologies -- 4.2 IoT Platforms for Home Automation/Ambient Intelligence -- 4.3 Smart Devices -- 5…Intelligent Large Scale Sensing -- 5.1 People-Centric Sensing -- 5.2 Ubiquitous Sensing -- 5.3 Location-Aware Sensing -- 5.4 OpportunisticOpportunistic Sensing and Participatory Sensing -- 5.5 Contextual Sensing -- 5.6 Machine Learning for Large-Scale Sensing -- 5.7 Sensing Architectures -- 6…The Cloud and the Internet of Intelligent Things -- 6.1 Wireless Sensor Networks Backend Infrastructures -- 6.2 Wireless Sensor Networks and Health Care -- 6.3 Machine-to-Machine (M2M) CommunicationsMachine-to-Machine Communications in the Cloud -- 6.4 Cloud Robotics -- 7…Conclusions -- References -- 2 Cloud Computing: Paradigms and Technologies -- Abstract -- 1…Introduction -- 2…Anatomy of Cloud Computing -- 2.1 Definition -- 2.2 Characteristics -- 2.3 Affects -- 2.4 Architecture -- 2.5 Technologies behind Cloud Computing -- 2.6 Advantages of the Use of Cloud Technology -- 3…Classifying Clouds and Vendors -- 3.1 Deployment Models -- 3.2 Service Models -- 3.2.1 Infrastructure-as-a-Service -- 3.2.2 Platform-as-a-Service -- 3.2.3 Software-as-a-Service -- 3.2.4 Data-as-a-Service -- 3.3 Cloud Vendors -- 4…Cloud Computing Aspects -- 4.1 Cost and Pricing -- 4.2 Service Level Agreement -- 4.3 Security -- 5…Cloud Computing and Distributed Computing Paradigms -- 5.1 Utility Computing Utility Computing Versus Cloud Computing. , 5.2 Volunteer Computing Volunteer Computing Versus Cloud Computing -- 5.3 Grid Computing Grid Computing Versus Cloud Computing -- 6…The Road Ahead -- 6.1 Lessons Learned in Cloud Adoption -- 6.2 Challenges and Future Research Directions -- 7…Conclusion -- References -- 3 A Comparison of Two Different Approaches to Cloud Monitoring -- Abstract -- 1…Introduction -- 2…Monitoring IaaS Cloud!IaaS Clouds -- 3…Related Work -- 4…Cloud Experience in European Research Projects -- 4.1 VISION VISIONCloud -- 4.2 mOSAIC -- 5…Monitoring in the VISION VISIONCloud platform -- 5.1 Overall Architecture and Requirements -- 5.2 Monitoring Architecture -- 5.3 Implementation Details -- 5.4 Event and Rulemonitoring!rules Format -- 6…Cloud AgencyCloud Agency -- 6.1 Monitoring Architecture -- 6.2 MeteringCloud Agency!metering the Cloud -- 6.3 Monitoring the Cloud -- 6.4 Implementation Details -- 7…Critical Analysis -- 8…Conclusion -- Acknowledgments -- References -- 4 Intuitive User Interfaces to Help Boost Adoption of Internet-of-Things and Internet-of-Content Services for All Disaster Management -- Abstract -- 1…Introduction -- 2…The Technology Supply Quest -- 3…Accessibility Matters: Opening Service Access to All -- 4…Setting up a Solution -- 4.1 The IOTC4ALL Service Model -- 4.2 Enhancing Services Components to Enrich Their Accessibility -- 4.3 The IOTC4ALL Marketplace -- 4.4 Smart Devices UI -- 4.4.1 Intelligent and Adaptive HCI -- 4.4.2 Ubiquitous Computing and Ambient Intelligence -- 4.4.3 From Unimodal to Multimodal Interfaces -- 4.4.4 Smart Devices Today -- 5…Conclusions and Future Work -- References -- 5 Intelligent Context: The Realization of Decision Support Under Uncertainty -- Abstract -- 1…Introduction -- 2…The Complexity of Context -- 3…Intelligent Context ProcessingContext!Intelligent context processing -- 3.1 The Context-Processing Algorithm. , 3.2 The Extended Context Processing AlgorithmContext!Extended context processing algorithm -- 3.2.1 Implementation -- 4…The Distribution Function -- 4.1 The Design of the Distribution Function -- 4.2 The Decision Boundary Proximity Issue -- 4.3 Partitioning and the Euclidean Distance Adjustment Analysis -- 4.3.1 An Analysis -- 4.4 Analysis Conclusions and Observations -- 5…Context Processing under UncertaintyContext!Uncertainty -- 6…Results and Discussion -- 6.1 Situational AwarenessContext!Situational awareness -- 7…Concluding Observations -- References -- 6 Autonomous Evolution of Access to Information in Institutional Decision-Support Systems Using Agent and Semantic Web Technologies -- Abstract -- 1…Introduction -- 2…Agent-Oriented Semantic Access -- 2.1 The generic system -- 2.2 The Legacy RDB System -- 2.3 The Semantic Query Access System -- 2.4 Decomposition of SQAS Use Cases -- 3…The SQAS Architecture -- 3.1 The High-Level Architecture of SQAS -- 3.2 The Roles of User Interface Agent -- 3.3 The Roles of Database Interface Agent -- 4…Agent-Oriented Middleware for Server Subsystems -- 4.1 The Database Interface Environment -- 4.2 A Note on Implementation Strategy -- 4.3 A Scenario for Agent-Assisted Ontology Development -- 5…Agent-Oriented Middleware for Client Subsystems -- 5.1 The User Interface Environment -- 5.2 A Scenario for Agent-Assisted Semantic Access -- 6…Closing Remarks -- 7…Conclusions -- References -- 7 A Research Survey on Large XML Data: Streaming, Selectivity Estimation and Parallelism -- Abstract -- 1…Introduction -- 1.1 Preliminaries -- 2…Selectivity Estimation -- 2.1 Properties of Selectivity Estimation Techniques -- 2.2 Path/Twig Selectivity Estimation Techniques -- 2.2.1 Synopsis-Based Estimation Techniques -- 2.2.2 Histogram-Based Estimation Techniques -- 3…Stream-Processing Approaches -- 3.1 Stream-Filtering Algorithms. , 3.2 Stream-Querying Algorithms -- 4…Parallel Query Processing -- 4.1 General Research on Decidability and Complexity -- 4.2 Data Distribution -- 4.3 Distribution and Parallel XPath Query Processing -- 4.4 Low-Level Implementation Techniques -- 4.5 DBMS and Join-Based Implementations -- 4.6 Map-Reduce, Hadoop Implementations -- 5…Conclusion -- References -- 8 Techniques and Applications to Analyze Mobility Data -- Abstract -- 1…Introduction -- 2…Collectingtrace collection Inter-cooperative Mobilitymobility Data -- 2.1 The HaggleHaggle Project -- 2.2 CRAWDADCRAWDAD -- 2.3 Socialsocial Tracer and HYCCUPS -- 2.3.1 Socialsocial Tracer -- 2.3.2 HYCCUPS -- 2.4 Benefits and Limitations -- 3…Techniques for Data Analysisdata analysis -- 3.1 Contact Timescontact time Distribution and Time of Day Dependence -- 3.2 Contact Predictabilitypredictability -- 3.3 Predictabilitypredictability of Interacting with Wirelesswireless Access Pointsaccess point -- 4…Experimental Results -- 4.1 Contact Timescontact time Distribution and Time of Day Dependence -- 4.1.1 UPB 2011 -- 4.1.2 UPB 2012 -- 4.2 Contact Predictabilitypredictability -- 4.3 Predictabilitypredictability of Interacting with Wireless Access Pointsaccess point -- 4.3.1 Rice -- 4.3.2 Nodobo -- 5…Conclusions and Future Work -- References -- 9 Memory Support Through Pervasive and Mobile Systems -- Abstract -- 1…Introduction -- 1.1 Evolution of Memory Prosthetics Devices -- 2…Context Aware Systems -- 3…Application Contextualization in Memory Support Systems -- 3.1 The Introduction of Time Context -- 3.2 The Introduction of Location Context -- 3.3 Web IntegrationWeb Integration -- 3.4 Integration of Time and Location ContextIntegration of Time and Location Context -- 3.5 Toward a New Generation of Memory Prosthetic DevicesMemory Prosthetic Devices -- 4…The Architecture of Our System -- 4.1 Server Side. , 4.1.1 A Three Tier ArchitectureThree Tier Architecture -- 4.1.2 Reasoning Engine -- 4.2 Client Side -- 5…ExperimentsExperiments and Users' FeedbacksUsers' Feedbacks -- 6…Ontology Management and Enrichment -- 7…Conclusions -- References -- 10 Viable Service Business Models Towards Inter-cooperative Strategies: Conceptual Evolutionary Considerations -- Abstract -- 1…Chronological Development of S-D Logic Model -- 2…The Role of Intangibility-Heterogeneity-Inseparability-Perishability Framework in the Separation of G-D and S-D Logics -- 2.1 IHIP Characteristics and Its Critics -- 2.2 Implications for the Definition of Services -- 3…Service Science Perspectives: Service-Dominant versus Goods-Dominant logic -- 3.1 Resource-Based Definition of Service Logic -- 3.2 S-D Logic and General Theory -- 4…Case Studies of Empirical Applications of S-D Logic -- 4.1 S-D Logic, Branding and Networks -- 4.2 S-D Logic and Discontinuous Innovations -- 4.3 S-D Logic and Co-Produced Knowledge -- 4.4 S-D Logic and Social Construction TheoriesSocial Construction Theories -- 4.5 S-D Logic and Logistics Service ValueLogistics Service Value -- 4.6 S-D Logic and ProcurementProcurement -- 4.7 S-D Logic and Service Experience -- 4.8 S-D Logic and Competitive AdvantageCompetitive Advantage -- 4.9 Cloud ComputingCloud computing as an Illustrative Example of S-D Logic -- 5…Conclusions and Future Work -- References -- 11 Discovering the Hidden Semantics in Enterprise Resource Planning Data Through Formal Concept Analysis -- Abstract -- 1…Introduction -- 1.1 Enterprise Resource Planning Systems -- 1.2 Rationale -- 2…Overview of Analysis -- 2.1 Data Preparation -- 2.2 Analysing Transactional ActivityAnalysis!Transactional Activity -- 2.3 Analysing Transactional Activity with DescriptionsAnalysis!Transactional Activity with Descriptions. , 2.4 Analysing Transactional Activity with Multiple AttributesAnalysis!Multiple Attributes.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Description / Table of Contents: This book discusses the theories, practices and concepts of utilising inter-operable and inter-cooperative next generation computational technologies. Coverage includes mobile and the emerging e-infrastructures of Web 2.0, SOA, P2P, Grids and Clouds.
    Type of Medium: Online Resource
    Pages: 1 online resource (475 pages)
    Edition: 1st ed.
    ISBN: 9783642349522
    Series Statement: Studies in Computational Intelligence Series
    DDC: 006
    Language: English
    Note: Title -- Foreword -- Preface -- Acknowledgements -- Contents -- The Web of Things - Challenges and Enabling Technologies -- The Web - An Application Platform for Real-World Things -- Towards the Web of Things -- Technologies Driving the Web of Things -- Web of Things Architecture -- Integrating Things on the Web -- Frameworks for the Web of Things -- Building 'Web of Things Applications -- The AJAX Technique -- Mashups - Composing Things on the Web -- Event Driven Approach -- Case Studies of Ambient Spaces -- Ambient Classrooms -- Ambient Meter -- Research Directions -- Conclusion -- References -- Context-Aware Environments for the Internet of Things -- Introduction to Internet of Things Infrastructure and Services -- Context Aware Internet of Things Infrastructure -- Situational Awareness -- Other Representation Approaches -- Architectural Issues -- CAPIM Infrastructure -- CAPIM Context Model -- Use Case -- Future Trends and Research Directions in Internet of Things Infrastructure and Services -- Conclusions and Remarks -- References -- Service Interoperability in the Internet of Things -- Introduction -- Background -- An Interoperability Framework -- Assessing Current Interoperability Technologies -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Rethinking Interoperability -- An IoT Case Study Scenario -- Service Interoperability -- Schema Interoperability -- Serialization Format -- Message Protocol -- Assessing the New Approach -- Contrasting SIL and Related Technologies -- Implementation -- Migration Path -- Conclusions and Future Work -- References -- The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments -- Introduction -- Classification of Ad Hoc Networks -- Mobile Ad Hoc Networks (MANETs) -- Vehicular Ad Hoc Networks (VANETs). , Wireless Sensor Networks (WSNs) -- Radio Frequency Identification (RFID) -- Near Field Communications (NFC) -- Routing Protocols for the IoT -- Towards an IoT Smart Environment -- The "thereuGO" Case Scenario -- A "thereuGO" IoT Model Architecture -- Conclusions -- References -- Challenges in Efficient Realtime Mobile Sharing -- Heterogeneous Networks -- IP Networks -- Wireless Sensor and Actuator Networks -- Multimedia Sessions -- Session Control -- Multimedia Session Mobility -- Multimedia Session Mobility versus MobileIP -- Federated Service Platforms -- Functionalities -- Mobility Management -- Pervasive Service Platforms -- Service Concept -- Session Concept -- Mobility -- Sharing of Content and Context -- Research Challenges and Progress -- Mobility and Sharing in Heterogeneous Networks -- Mobility and Sharing of WSANs -- Mobility and Sharing of Multimedia Sessions -- Service Platforms -- Pervasive Service Platforms -- Conclusion -- References -- Malware Detection and Prevention in RFID Systems -- Introduction -- SQL Injection Attacks -- Malware in RFID Systems -- Differences in Web Based and RFID SQLIA -- Related Work -- Policy Based RFID Malware Detection and Prevention -- Approach Overview -- Static Analysis -- Runtime Monitoring -- Query Structure Creation and Comparison -- Query Tokenization -- Query Structure Policy Generation -- Runtime Query Matching -- Security Evaluations -- RFID Tag Data Cleaning -- Query Structure Matching -- Conclusions and Future Work -- References -- Conceptual Model of Business Services Availability vs. Interoperability on Collaborative IoT-enabled eBusiness Platforms -- Introduction -- Contemporary Concepts, Architectures and Technologies to Support Effective IoT-enabled Business Services Delivery -- Enabling High Services Availability on SDP. , Hypothetical Model to Increase Service Availability on Distributed SDPs -- Numerical Patterns of the Model -- Literature Case Studies - Business Services Availability in the Collaborative Mobile Environment -- Conclusions -- References -- Organizational Control Reconfigurations for a Robust Smart Power Grid -- Introduction -- Dynamic I/O Binding Reconfigurations -- Application Scenarios -- Dynamic Load-Balancing of Power Lines -- Dynamic Switching of Power Flow -- Dynamic Allocation of Operating Reserves -- Dynamic Restoration After Blackout -- Discussion -- Conclusions and Future Work -- References -- Homesick L\'{e}vy Walk and Optimal Forwarding Criterion of Utility-Based Routing under Sequential Encounters -- Introduction -- Existing Mobility Models and Homesick L´evy Walk -- Random Walk -- Random Waypoint -- L´evy Flight and L´evy Walk -- Homesick L´evy Walk -- Routing Protocols in Delay Tolerant Networks -- Epidemic Routing -- Spray and Wait -- PRoPHET -- MaxProp -- Optimal Forwarding Criterion for Utility-Based Routing under Sequential Encounters -- Optimal Stopping Theory -- Proposed Routing Method -- Performance Evaluation -- Evaluation Measures -- Simulation Setup -- Simulation Results -- Conclusion -- Open Issues -- References -- Hybrid Cloud Architecture for VANET Simulations -- Introduction -- The Internet of Things and Cloud Computing -- Simulation of Ubiquitous Networks Over Cloud: Topicality in the IoT Paradigm -- VANET Networks: Characteristics and Scalability Issues -- Scalability of Simulations -- Cloud Computing: Elasticity Model -- Design of Scalable Cloud Architectures -- Elasticity and Scalability -- VANET Simulations Over Cloud -- Learning Phase -- Proposed Architecture -- Overview of the Cloud Infrastructure -- Public Cloud Platform with Amazon EC2 -- Scheduling Algorithms -- Performance Analysis. , Effectiveness of the Scheduling Algorithm -- Scheduling Algorithm Optimization - Resource Usage -- Scheduling Algorithm Optimization - Memory Usage -- Conclusions -- References -- Constructing Large Scale CooperativeMulti-Agent Systems from Semantic P2PNetworks -- Introduction -- Large Scale Multi Agent System Architecture Based on Semantic P2P Network -- Formal Definitions -- Theorems Related to VIRGO -- Construction and Maintenance of VIRGO Agent -- Formal Definition of Large Scale Cooperative Multi-Agent Systems Based on Semantic P2P Networks -- Distributed Action for Large Scale Cooperative Multi-Agent Systems -- Case Applications -- Simulation of Social Society Based on Semantic P2P Network -- Semantic P2P Network for e-Business -- Conclusion -- References -- An Efficient, Secure and User Privacy-Preserving Search Protocol for Peer-to-Peer Networks -- Introduction -- Related Work -- General Searching Schemes in P2P Networks -- Secure Searching Schemes in P2P Networks -- Privacy-Preserving Searching Schemes in P2PNetworks -- The Secure and Privacy-Aware Searching Protocol -- The Network Environment -- The Proposed Search Protocol -- Privacy-Preservation in Searching -- Performance Metrics for the Proposed Protocol -- Performance Evaluation of the Proposed Protocol -- Conclusion -- References -- The Tailored Fabric of Intelligent Environments -- Introduction -- State of the Art -- Internet of Things -- Intelligent Environments -- TheWorldView -- Enabling Technology for IoT and IE convergence -- Middleware -- Agents, Applications and Virtual Appliances -- Case Study: The Essex iSpace -- FollowMe -- HotSpot -- Conclusions and Future Challenges -- References -- Generalized World Entities as an Unifying IoT Framework: A Case for the GENIUS Project -- Introduction -- The GWE Paradigm -- General Context -- A First Example. , The GENIUS' Procedures Implementing the GWE Paradigm -- Identification and Low-Level Description of the GWEs -- Conceptual Representation of the World -- Full Recognition and Categorization of the GWEs -- Reasoning Based on the Full Recognition of an Existing Situation -- An "Assisted Living" Real-Life Scenario -- Conclusion -- References -- Plugging Text Processing and Mining in a Cloud Computing Framework -- Introduction -- Cloud Computing -- Service Delivery Models -- Deployment Models -- Information Retrieval and Text Mining -- Information Retrieval -- Albanian Language Processing and Stemming -- Apache Hadoop -- General Framework -- Analysis, Design and Implementation of the Plugin -- Analysis -- Design and Implementation -- Running the Plugin in the Hadoop Cluster -- Evaluation -- Experimental Setting and Cluster Creation -- Dataset -- Evaluation Setting and Experimental Results -- Analysis and Interpretation of Results -- Conclusion and Future Work -- References -- A Recommendation System for Browsing of Multimedia Collections in the Internet of Things -- Introduction -- Related Work -- System Overview -- The Recommendation Model -- Modelling the Context -- The Recommendation Process -- System Customization in the Cultural Heritage Domain -- Preliminary Experimental Results -- User Satisfaction -- Conclusions and Future Work -- References -- From Patient Information Services to Patient Guidance Services-The iCare Approach -- Introduction -- Semantic Interoperability for e-Health -- Healthcare System Integration issues and State of the Art -- Current State-of-the-Art in Integration with Personal Care Devices -- Current State-of-the-Art in Security and Privacy of Citizen Context and Electronic Health Records (EHRs) -- Semantic Web Technologies -- Semantic Web Services -- The iCare PGS Model -- The iCare PGS Semantic Service Platform. , PGS and Data Collection as Interoperability Components.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...