29   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Geming Xia, Chaodong Yu and Jian Chen    
With the development of 5G and artificial intelligence, the security of Cloud-Edge-End Collaboration (CEEC) networks becomes an increasingly prominent issue due to the complexity of the environment, real-time variability and diversity of edge devices in ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ling Xu, Jianzhong Qiao, Shukuan Lin and Ruihua Qi    
In volunteer computing (VC), the expected availability time and the actual availability time provided by volunteer nodes (VNs) are usually inconsistent. Scheduling tasks with precedence constraints in VC under this situation is a new challenge. In this p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhenpeng Liu, Qiannan Liu, Jianhang Wei, Dewei Miao and Jingyi Wang    
With the rapid development of the Internet of Things, location-based services have emerged in many social and business fields. In obtaining the service, the user needs to transmit the query data to an untrusted location service provider for query and the... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jianhua Liu and Zibo Wu    
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effic... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ogan Yigitbasioglu    
This paper uses transaction cost theory to study cloud computing adoption. A model is developed and tested with data from an Australian survey. According to the results, perceived vendor opportunism and perceived legislative uncertainty around cloud comp... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Gonçalo Carvalho, Filipe Magalhães, Bruno Cabral, Vasco Pereira and Jorge Bernardino    
Simulators allow for the simulation of real-world environments that would otherwise be financially costly and difficult to implement at a technical level. Thus, a simulation environment facilitates the implementation and development of use cases, renderi... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Sunday Adewale Olaleye,Solomon Sunday Oyelere,Ismaila Temitayo Sanusi,Joseph Friday Agbo     Pág. pp. 4 - 20
The concept of ubiquitous computing allows the seamless: anywhere, anytime, anyone interaction of computing devices and technology. Ubiquitous commerce simply known as u-commerce is an evolution of commerce based on recent innovations and advancement in ... ver más

 
en línea
Shona Leitch,Matthew Warren    
Ethics is an important element in all aspects of computing, but proves to be a real problem in the development and delivery of E-Commerce systems. There are many aspects of ethics that can affect E-Commerce systems, but often research is focused on the e... ver más
Revista: Australasian Journal of Information Systems    Formato: Electrónico

 
en línea
Muhammad Firdaus and Kyung-Hyune Rhee    
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Rajni Goel    
Cloud computing has become a force multiplier for organizations as they realize the benefit from the shared computing platforms and services offered by cloud computing. Providers market shared computing platforms and services because of their convenience... ver más

 
en línea
Yao Du, Zehua Wang and Victor C. M. Leung    
Blockchain, a distributed ledger technology (DLT), refers to a list of records with consecutive time stamps. This decentralization technology has become a powerful model to establish trust among trustless entities, in a verifiable manner. Motivated by th... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdullahi Mikail and Bernardi Pranggono    
The shift to Cloud computing has brought with it its specific security challenges concerning the loss of control, trust and multi-tenancy especially in Infrastructure-as-a-Service (IaaS) Cloud model. This article focuses on the design and development of ... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Maria Teresa Borzacchiello,Ray Boguslawski,Francesco Pignatelli     Pág. 202 - 222
Digital government in Europe is evolving rapidly, thanks to both advances in technology and the tendency for governments to establish more participative relationships with businesses and citizens. There is a drive to promote economic growth in digital bu... ver más

 
en línea
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe    
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-an... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe    
The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-an... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Juncal Alonso, Leire Orue-Echevarria, Eneko Osaba, Jesús López Lobo, Iñigo Martinez, Josu Diaz de Arcaya and Iñaki Etxaniz    
The current IT market is more and more dominated by the ?cloud continuum?. In the ?traditional? cloud, computing resources are typically homogeneous in order to facilitate economies of scale. In contrast, in edge computing, computational resources are wi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tasos Bakogiannis, Ioannis Mytilinis, Katerina Doka and Georgios Goumas    
Cloud computing offerings traditionally originate from a handful of large and well established providers, which monopolize the market, preventing small players and individuals from having a share. As a result, the few, blindly and perforce trusted entiti... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Jing Liu, Xuesong Hai and Keqin Li    
Massive amounts of data drive the performance of deep learning models, but in practice, data resources are often highly dispersed and bound by data privacy and security concerns, making it difficult for multiple data sources to share their local data dir... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dmitry Namiot,Eugene Ilyushin,Oleg Pilipenko     Pág. 119 - 127
The development and use of artificial intelligence systems (machine learning) in critical areas (avionics, autonomous movement, etc.) inevitably raise the question of the reliability of the software used. Trusted computing systems have been around for a ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Guangjie Lv, Caixia Song, Pengmin Xu, Zhiguo Qi, Heyu Song and Yi Liu    
In recent years, with the frequent crises of trust in the food industry, food safety issues have become an issue of particular concern to consumers. The traditional agricultural food logistics and transportation model can no longer guarantee the traceabi... ver más
Revista: Agriculture    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »