|
|
|
Geming Xia, Chaodong Yu and Jian Chen
With the development of 5G and artificial intelligence, the security of Cloud-Edge-End Collaboration (CEEC) networks becomes an increasingly prominent issue due to the complexity of the environment, real-time variability and diversity of edge devices in ...
ver más
|
|
|
|
|
|
|
Ling Xu, Jianzhong Qiao, Shukuan Lin and Ruihua Qi
In volunteer computing (VC), the expected availability time and the actual availability time provided by volunteer nodes (VNs) are usually inconsistent. Scheduling tasks with precedence constraints in VC under this situation is a new challenge. In this p...
ver más
|
|
|
|
|
|
|
Zhenpeng Liu, Qiannan Liu, Jianhang Wei, Dewei Miao and Jingyi Wang
With the rapid development of the Internet of Things, location-based services have emerged in many social and business fields. In obtaining the service, the user needs to transmit the query data to an untrusted location service provider for query and the...
ver más
|
|
|
|
|
|
|
Jianhua Liu and Zibo Wu
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effic...
ver más
|
|
|
|
|
|
|
Ogan Yigitbasioglu
This paper uses transaction cost theory to study cloud computing adoption. A model is developed and tested with data from an Australian survey. According to the results, perceived vendor opportunism and perceived legislative uncertainty around cloud comp...
ver más
|
|
|
|
|
|
|
Gonçalo Carvalho, Filipe Magalhães, Bruno Cabral, Vasco Pereira and Jorge Bernardino
Simulators allow for the simulation of real-world environments that would otherwise be financially costly and difficult to implement at a technical level. Thus, a simulation environment facilitates the implementation and development of use cases, renderi...
ver más
|
|
|
|
|
|
|
Sunday Adewale Olaleye,Solomon Sunday Oyelere,Ismaila Temitayo Sanusi,Joseph Friday Agbo
Pág. pp. 4 - 20
The concept of ubiquitous computing allows the seamless: anywhere, anytime, anyone interaction of computing devices and technology. Ubiquitous commerce simply known as u-commerce is an evolution of commerce based on recent innovations and advancement in ...
ver más
|
|
|
|
|
|
|
Shona Leitch,Matthew Warren
Ethics is an important element in all aspects of computing, but proves to be a real problem in the development and delivery of E-Commerce systems. There are many aspects of ethics that can affect E-Commerce systems, but often research is focused on the e...
ver más
|
|
|
|
|
|
|
Muhammad Firdaus and Kyung-Hyune Rhee
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts o...
ver más
|
|
|
|
|
|
|
Rajni Goel
Cloud computing has become a force multiplier for organizations as they realize the benefit from the shared computing platforms and services offered by cloud computing. Providers market shared computing platforms and services because of their convenience...
ver más
|
|
|
|
|
|
|
Yao Du, Zehua Wang and Victor C. M. Leung
Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated by th...
ver más
|
|
|
|
|
|
|
Abdullahi Mikail and Bernardi Pranggono
The shift to Cloud computing has brought with it its specific security challenges concerning the loss of control, trust and multi-tenancy especially in Infrastructure-as-a-Service (IaaS) Cloud model. This article focuses on the design and development of ...
ver más
|
|
|
|
|
|
|
Maria Teresa Borzacchiello,Ray Boguslawski,Francesco Pignatelli
Pág. 202 - 222
Digital government in Europe is evolving rapidly, thanks to both advances in technology and the tendency for governments to establish more participative relationships with businesses and citizens. There is a drive to promote economic growth in digital bu...
ver más
|
|
|
|
|
|
|
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-an...
ver más
|
|
|
|
|
|
|
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-an...
ver más
|
|
|
|
|
|
|
Juncal Alonso, Leire Orue-Echevarria, Eneko Osaba, Jesús López Lobo, Iñigo Martinez, Josu Diaz de Arcaya and Iñaki Etxaniz
The current IT market is more and more dominated by the ?cloud continuum?. In the ?traditional? cloud, computing resources are typically homogeneous in order to facilitate economies of scale. In contrast, in edge computing, computational resources are wi...
ver más
|
|
|
|
|
|
|
Tasos Bakogiannis, Ioannis Mytilinis, Katerina Doka and Georgios Goumas
Cloud computing offerings traditionally originate from a handful of large and well established providers, which monopolize the market, preventing small players and individuals from having a share. As a result, the few, blindly and perforce trusted entiti...
ver más
|
|
|
|
|
|
|
Jing Liu, Xuesong Hai and Keqin Li
Massive amounts of data drive the performance of deep learning models, but in practice, data resources are often highly dispersed and bound by data privacy and security concerns, making it difficult for multiple data sources to share their local data dir...
ver más
|
|
|
|
|
|
|
Dmitry Namiot,Eugene Ilyushin,Oleg Pilipenko
Pág. 119 - 127
The development and use of artificial intelligence systems (machine learning) in critical areas (avionics, autonomous movement, etc.) inevitably raise the question of the reliability of the software used. Trusted computing systems have been around for a ...
ver más
|
|
|
|
|
|
|
Guangjie Lv, Caixia Song, Pengmin Xu, Zhiguo Qi, Heyu Song and Yi Liu
In recent years, with the frequent crises of trust in the food industry, food safety issues have become an issue of particular concern to consumers. The traditional agricultural food logistics and transportation model can no longer guarantee the traceabi...
ver más
|
|
|
|