Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface Organization Contents Implementation of Self-adaptive Middleware for Mobile Vehicle Tracking Applications on Edge Computing
1 Introduction 2 Related Work 3 Approach
3.1 Scenario 3.2 Requirements 3.3 Approach
4 Design and Implementation
4.1 Design of Self-adaptive Middleware 4.2 Implementation
5 Mobile Vehicle Tracking Application
5.1 Vehicle Recognition 5.2 Mobile Vehicle Tracking
6 Conclusion References
Towards the Succinct Representation of m Out of n
1 Introduction
1.1 Related Works 1.2 Contributions
2 Proposed Approach
2.1 Preliminaries 2.2 Unranking Using Optimization 2.3 Parallelization
3 Computational Experiments
3.1 Basic Settings 3.2 Experiment Instances 3.3 Complexity Function
4 Concluding Remarks References
Extending the Advisor Concept to Deal with Known-Ahead Transportation Tasks
1 Introduction 2 The EIA for Pickup and Delivery Problems
2.1 Pickup and Delivery Problems 2.2 Digital Infochemical Coordination 2.3 The Efficiency Improvement Advisor for DIC for PDP
3 The EEIA for Pickup and Delivery 4 Experimental Evaluation
4.1 Setup 4.2 The EEIA for Static Run Instances 4.3 Comparison of the Systems for Two Vehicles 4.4 EEIA vs EIA vs Base System for Two and More Vehicles
5 Related Works 6 Conclusion and Future Work References
A Framework for Task-Guided Virtual Machine Live Migration
1 Introduction 2 Background and Related Works 3 Task Guided Live Migration 4 Experiments and Analysis 5 Concluding Remarks and Future Directions References
Verifiable Privacy-Preserving Payment Mechanism for Smart Grids
1 Introduction 2 Preliminaries
2.1 System Model 2.2 Security Requirement 2.3 Partially Blind Signature Scheme 2.4 Online Electronic Cash Protocol
3 The Proposed Scheme
3.1 System Initialization 3.2 User Payment Generation 3.3 Collecting Blinded E-Cash 3.4 Obtaining Electricity Payment
4 Security
4.1 Unlinkability 4.2 Unforgeability 4.3 Confidentiality
5 Comparison 6 Conclusion References
Increasing Interoperability Between Heterogeneous Smart City Applications
1 Introduction 2 Related Work 3 Design of Architecture
3.1 Architectural Overview 3.2 Business Layer Components 3.3 Core Layer Components
4 Conclusion and Future Work References
Reduced Transmission in Multi-server Coded Caching
1 Introduction 2 Known Result and Our Main Results 3 Preliminaries
3.1 MN Scheme 3.2 Bipartite Graph and the Scheme in LAP 3.3 Research Motivation
4 Improved Scheme for Three Servers
4.1 Refined Methods 4.2 Modified Scheme
5 More Refined Methods 6 Conclusion References
Distributed Sensor Fusion for Activity Detection in Smart Buildings
Abstract 1 Introduction 2 Distributed Fusion Algorithm
2.1 Local HMM
3 Fusion Algorithm 4 Performance Evaluation
4.1 Choice of Sensing Modality 4.2 Experimental Deployment 4.3 Simulation Methodology 4.4 Feature Selection 4.5 Time Requirements and Computational Cost 4.6 Activity Recognition 4.7 Effect of Channel Erasure
5 Conclusions Acknowledgment Appendix References
Climbing Ranking Position via Long-Distance Backlinks
1 Introduction 2 Scenario
2.1 Link Building 2.2 PageRank
3 Long-Distance In-link Based Heuristic
3.1 Results
4 Conclusions References
Financial Application on an Openstack Based Private Cloud
1 Introduction
1.1 Problem Description 1.2 Infrastructure
2 Related Work 3 Finance Background 4 Monte-Carlo Simulation 5 Experiments and Evaluation
5.1 Application Testing 5.2 Performance Testing
6 Conclusion and Future Work References
Towards Island Networks: SDN-Enabled Virtual Private Networks with Peer-to-Peer Overlay Links for Edge Computing
Abstract 1 Introduction 2 IoT Application Characteristics
2.1 An Example Scenario 2.2 Model Characteristics 2.3 Networking Implications 2.4 Overlay and Island Networks Concepts
3 An Architecture for Overlay Networks
3.1 Controller 3.2 Data Plane
4 Experimental Evaluation
4.1 Experimental Testbed 4.2 Scenarios and Results 4.3 Results Evaluation
5 Conclusion Acknowledgments References
Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys
1 Introduction 2 Preliminaries
2.1 Notations 2.2 Time-Bound Keys 2.3 Dynamical-Almost-Full Anonymity 2.4 Digital Signature Schemes 2.5 Encryption Scheme 2.6 Simulation-Sound Non-interactive Zero Knowledge Proof System
3 Our Scheme
3.1 Description of the Scheme
4 Security Analysis of the Scheme
4.1 Applying Dynamical-Almost-Full Anonymity 4.2 Correctness 4.3 Dynamical-Almost-Full Anonymity 4.4 Traceability 4.5 Non-frameability
5 Evaluation of the Scheme and Conclusion References
Path Planning for Multi-robot Systems in Intelligent Warehouse
Abstract 1 Introduction 2 Statements and Preliminaries
2.1 Statements 2.2 Preliminaries
3 Solution for Troubles
3.1 Local Minima 3.2 Non-reachable Target 3.3 Collision and Traffic Jams
4 Simulation 5 Conclusion Acknowledgment References
Dynamic Framework for Reconfiguring Computing Resources in the Inter-cloud and Its Application to Genome Analysis Workflows
1 Introduction 2 Virtual Cloud Provider 3 Overview of Reconfiguration Framework
3.1 Reconfiguration Mechanism 3.2 Constraints on Specifications
4 Application Scheduler for Genome Analysis Workflows
4.1 Overview 4.2 Metrics Collection Scheme
5 Evaluation 6 Related Work
6.1 Resource Managers 6.2 Reconfiguration of Workflow Execution
7 Conclusion References
Game-Theoretic Approach to Self-stabilizing Minimal Independent Dominating Sets
1 Introduction 2 Background and Related Work 3 IDS Games
3.1 MIS-Based IDS Game 3.2 Symmetric MDS-Based IDS Game 3.3 Asymmetric MDS-Based IDS Game
4 Simulation Results 5 Conclusions References
Towards Social Signal Separation Based on Reconstruction Independent Component Analysis
1 Introduction 2 Problem Definition 3 Separating Social Event Signals from Noise with RICA 4 Case Study with Social Events on Twitter 5 Conclusion and Future Work References
Performance, Resilience, and Security in Moving Data from the Fog to the Cloud: The DYNAMO Transfer Framework Approach
1 Introduction 2 Related Work 3 Design
3.1 Edge/Cloud Sides Key Exchange 3.2 Edge Side Design 3.3 Cloud Side Design
4 Implementation 5 Evaluation 6 Conclusion and Future Directions References
Development of a Support System to Resolve Network Troubles by Mobile Robots
1 Introduction 2 Monitoring System of Network Devices by Robots
2.1 Monitoring System of Network Devices 2.2 Collecting Information by Robots
3 Proposed Method 4 Implementation
4.1 Overview of System 4.2 Additional Functions to Robots 4.3 Checking Terminal and Supporting Taking a Photo of Display 4.4 Confirming Whether Tablet PC Is Returned to Robot 4.5 Operation of Tablet PC 4.6 Obtaining Characters from Image
5 Experiment 6 Discussion 7 Related Studies 8 Conclusion References
A Benchmark Model for the Creation of Compute Instance Performance Footprints
1 Introduction 2 Problem Formulation 3 Related Work 4 Benchmark Model 5 Example Benchmark Process
5.1 Benchmark Setup 5.2 Benchmark Results
6 Conclusion References
Developing Agent-Based Smart Objects for IoT Edge Computing: Mobile Crowdsensing Use Case
1 Introduction 2 Agent-Based Crowdsensing System 3 Systematic Approach to Crowdsensing So Development
3.1 Analysis Phase 3.2 Design Phase 3.3 Implementation Phase
4 Discussion and Conclusion References
Path Planning of Robotic Fish in Unknown Environment with Improved Reinforcement Learning Algorithm
Abstract 1 Introduction 2 Improved Reinforcement Learning for Path Planning
2.1 Q Learning 2.2 Simulated Annealing 2.3 Improved Reinforcement Learning
3 Robotic Fish and Environment Model
3.1 Robotic Fish 3.2 2D Environment Model
4 Experiment Results 5 Conclusion Acknowledgement References
Review of Swarm Intelligence Algorithms for Multi-objective Flowshop Scheduling
Abstract 1 Introduction 2 Multi-objective Flowshop Scheduling Problem 3 Literature Review
3.1 SIAs for Multi-objective Flowshop Scheduling 3.2 Discussion
4 Future Research Directions
4.1 New Hybrid MOSIA 4.2 MOSIA with High Computational Efficiency 4.3 MOSIA Based on Machine Learning and Big Data 4.4 Multi-objective Approach 4.5 Many-objective Flowshop Scheduling
5 Conclusion Acknowledgement References
Exploiting Long Distance Connections to Strengthen Network Robustness
1 Introduction 2 Scale–Free Networks Robustness Enhancement 3 Results 4 Conclusions References
An Online Adaptive Sampling Rate Learning Framework for Sensor-Based Human Activity Recognition
1 Introduction 2 Proposed Framework 3 Applied Algorithms 4 Conclusions References
A Secure Video-Based Robust and Aesthetic 2D Barcode
1 Introduction 2 The Proposed Video-Based Robust and Aesthetic 2D Barcode 3 Implementation and Demo of the Proposed vRA Code 4 Conclusion References
A Migratable Container-Based Replication Management for Inter-cloud
1 Introduction 2 Requirements 3 Approach 4 Conclusion References
Dilated Deep Residual Network for Post-processing in TPG Based Image Coding
1 Introduction 2 Methodology
2.1 Discussing
3 Conclusion References
Underground Intelligent Logistic System Integrated with Internet of Things
Abstract 1 Introduction 2 Architecture 3 Conception
3.1 Decentralized Network Layout 3.2 Intelligent Management and Distribution 3.3 Intensification of Management and Distribution
4 Internet of Things and Urban Underground Intelligent Logistics System 5 Summary References
Author Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion