Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
8
views
17
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,134
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advanced Information Networking and Applications: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020)
Mobile Fog Computing Model of a Topic-Based Publish/Subscribe System
other
Author(s):
Takumi Saito
,
Shigenari Nakamura
,
Tomoya Enokido
,
Makoto Takizawa
Publication date
(Online):
March 28 2020
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
17
Record
: found
Abstract
: not found
Article
: not found
An energy-efficient model for fog computing in the Internet of Things (IoT)
Ryuji Oma
,
Shigenari Nakamura
,
Dilawaer Duolikun
…
(2018)
0
comments
Cited
15
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Fog Computing in the Internet of Things
Amir M. Rahmani
,
Pasi Liljeberg
,
Jürgo-Sören Preden
…
(2018)
0
comments
Cited
7
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
An energy-efficient history-based routing scheme for opportunistic networks
Sanjay Dhurandher
,
Deepak Sharma
,
Isaac Woungang
…
(2017)
0
comments
Cited
3
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2020
Publication date (Online):
March 28 2020
Pages
: 250-257
DOI:
10.1007/978-3-030-44041-1_23
SO-VID:
5396c501-d27f-404b-994f-310a51d57368
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks
pp. 12
Blockchain-Based Reputation System in Agri-Food Supply Chain
pp. 22
An Enhanced Convolutional Neural Network Model Based on Weather Parameters for Short-Term Electricity Supply and Demand
pp. 36
A Secure Distributed e-Health System for the Management of Personal Health Metrics Data
pp. 52
Machine Learning-Based Regression Models for Price Prediction in the Australian Container Shipping Industry: Case Study of Asia-Oceania Trade Lane
pp. 60
Modeling the Chatbot Quality of Services (CQoS) Using Word Embedding to Intelligently Detect Inappropriate Responses
pp. 71
Self-balanced IPv4–IPv6 Lossless Translators with Dynamic Addresses Mapping
pp. 85
Eye Tracking Technology in Personal Authentication Protocols
pp. 90
Techno-Economic Analysis of MMWave vs Mid-Band Spectrum in 5G Networks
pp. 106
Leveraging Fine-Grained Access Control in Blockchain-Based Healthcare System
pp. 116
Improving Spectrum Usage on Full-Duplex Communications with an Innovative Channel Reservation
pp. 127
Machine Learning Based Data Reduction in WSN for Smart Agriculture
pp. 139
A QoS-Based Service Chain Composition Approach for a Dynamic End-to-End Resource Allocation in NFV
pp. 153
ITMN: A New MAC Protocol for Improving Throughput of Multihop Wireless Networks Considering Number of Neighbor Nodes
pp. 164
DALC: Distributed Automatic LSTM Customization for Fine-Grained Traffic Speed Prediction
pp. 176
Periodic Mining of Traffic Information in Industrial Control Networks
pp. 184
The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine Environments
pp. 193
A Fuzzy Decision Tree Based Tasks Orchestration Algorithm for Edge Computing Environments
pp. 204
CUSCO: A Customizable Solution for NFV Composition
pp. 217
Evaluating Energy Efficiency and Security for Internet of Things: A Systematic Review
pp. 229
IoT Geolocation Performance Using LoRaWAN
pp. 240
TF-BiLSTMS2S: A Chinese Text Summarization Model
pp. 250
Mobile Fog Computing Model of a Topic-Based Publish/Subscribe System
pp. 258
Benchmarking Predictive Models in Electronic Health Records: Sepsis Length of Stay Prediction
pp. 268
Distributed Approach to Fog Computing with Auction Method
pp. 276
A Self–learning Personal Privacy Assistant
pp. 288
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering CM and LDVM Replacement Methods
pp. 298
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement Methods
pp. 308
A Mini-review: Conventional and Metaheuristic Optimization Methods for the Solution of Optimal Power Flow (OPF) Problem
pp. 320
Narrative Knowledge Representation and Blockchain: A Symbiotic Relationship
pp. 333
Investigating Feature Selection for Predicting the Number of Bus Passengers by Monitoring Wi-Fi Signal Activity from Mobile Devices
pp. 345
Better User Clustering Scheme in Distributed NOMA Systems
pp. 357
Sample Selection Search to Predict Elephant Flows in IXP Programmable Networks
pp. 369
An Experimental Study on Culturally Competent Robot for Smart Home Environment
pp. 381
A Heuristic Approach for Large-Scale Orchestration of the In-band Data Plane Telemetry Problem
pp. 393
Impact of Road Gradient on Electric Vehicle Energy Consumption in Real-World Driving
pp. 405
Architecture for Visualizing Indoor Air Quality Data with Augmented Reality Based Cognitive Internet of Things
pp. 419
Security Measures in Vehicular Ad-Hoc Networks on the Example of Bogus and Sybil Attacks
pp. 431
Comparative Analysis of Japan and the US Cybersecurity Related Newspaper Articles: A Content and Sentiment Analysis Approach
pp. 444
A Universal Defense System Based on Backtrace Canary for ELF Against Vulnerabilities
pp. 458
Budgeted Constrained Coverage on Series-Parallel Multi-interface Networks
pp. 470
Transformative Computing for Distributed Services Management Protocols
pp. 476
Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison Study
pp. 488
A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node’s Unique Encounters as a New Parameter
pp. 499
A Blockchain-Based Secure Data Storage and Trading Model for Wireless Sensor Networks
pp. 512
Performance Evaluation of Nomadic Lévy Walk on Unit Disk Graphs Using Hierarchical Clustering
pp. 523
Animal Species Recognition Using Deep Learning
pp. 533
Implementing On-Chip Wireless Communication in Multi-stage Interconnection NoCs
pp. 547
Synergy of Trust, Blockchain and Smart Contracts for Optimization of Decentralized IoT Service Platforms
pp. 559
SSR: A Stall Scheme Reducing Bubbles in Load-Use Hazard of RISC-V Pipeline
pp. 566
On the Regression and Assimilation for Air Quality Mapping Using Dense Low-Cost WSN
pp. 579
Evaluation of SLA Negotiation for Personalized SDN Service Delivery
pp. 591
Trust-Based Decision Making for Food-Energy-Water Actors
pp. 603
Trust-Based Human-Machine Collaboration Mechanism for Predicting Crimes
pp. 617
Detection of Users’ Abnormal Behavior on Social Networks
pp. 630
Efficient Authentication Scheme Using Blockchain in IoT Devices
pp. 642
VNF-DOC: A Dynamic Overload Controller for Virtualized Network Functions in Cloud
pp. 657
On the Impact of Delays on Control Packets of Routing Algorithms and Mitigation Strategies for Wireless Ad-Hoc Networks
pp. 669
An Innovative Big Data Predictive Analytics Framework over Hybrid Big Data Sources with an Application for Disease Analytics
pp. 681
Optimisation of the CSIT Allocation Size for Interference Alignment Technique in Massive MIMO Networks
pp. 693
A Flexible and Interpretable Framework for Predicting Anomalous Behavior in Industry 4.0 Environments
pp. 703
Future Internet Exchange Point (FIXP): Enabling Future Internet Architectures Interconnection
pp. 715
Ensuring the Practical Applicability of Algorithms for User Behavior Modeling Through Integration into Building Automation Systems
pp. 722
Analysis of Human Vital Functions Based on Data from Internet of Things Devices
pp. 734
Adaptive Multi-agent-based Alert System for Diseases’ Detection
pp. 746
Anycast MAC Protocol with Advanced Preamble for Wireless Sensor Networks
pp. 758
Ant Colony Optimization Algorithm for Split Delivery Vehicle Routing Problem
pp. 768
Multi-objective Priority Based Heuristic Optimization for Region Coverage with UAVs
pp. 780
Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis
pp. 792
Incentive Mechanism for Mobile Crowdsensing in Spatial Information Prediction Using Machine Learning
pp. 804
Constructing Balanced, Conflict-Minimal, Overlap-Fair Channel Sensing Schedules
pp. 817
Investigation into MPI All-Reduce Performance in a Distributed Cluster with Consideration of Imbalanced Process Arrival Patterns
pp. 830
Enabling Multi-domain and End-to-End Slice Orchestration for Virtualization Everything Functions (VxFs)
pp. 845
A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones
pp. 858
A Bottom-Up Approach for Extracting Network Intents
pp. 871
: Measuring Centralization of DNS Infrastructure in the Wild
pp. 883
Classification of Encrypted Internet Traffic Using Kullback-Leibler Divergence and Euclidean Distance
pp. 898
Facing the Unknown: A Stream Learning Intrusion Detection System for Reliable Model Updates
pp. 910
Efficient Distributed D2D ProSe-Based Service Discovery and Querying in Disaster Situations
pp. 922
Micro-service Based Network Management for Distributed Applications
pp. 934
Offloading the Small Cells for Load Balancing in UDNs Using the Proactive and the User Transfer Algorithms with Reducing the APs Inter-communications
pp. 947
Weighted-Gain Beam Selection for Beamspace mmWave Massive MIMO Systems
pp. 957
Implementing the Cognition Level for Industry 4.0 by Integrating Augmented Reality and Manufacturing Execution Systems
pp. 968
Dynamic User Interests Profiling Using Fuzzy Logic Application
pp. 980
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking
pp. 994
A Secure and Distributed Control Plane for Software Defined Networks
pp. 1007
Efficiently Detecting Web Spambots in a Temporally Annotated Sequence
pp. 1020
On Scheduling Transaction in Grid Processing System Considering Load Using Fuzzy Ant Colony Optimization
pp. 1032
DeepScheduling: Grid Computing Job Scheduler Based on Deep Reinforcement Learning
pp. 1045
Communication QoS-Aware Navigation of Autonomous Robots for Effective Coordination
pp. 1057
Semantic CPPS in Industry 4.0
pp. 1069
Semantically Oriented Idioms for Sentiment Analysis. A Linguistic Resource for the Italian Language
pp. 1078
Keywords Co-occurrence Analysis to Map New Topics and Recent Trends in Social Research Methods
pp. 1089
Context-Aware Service Composition with Functionally Equivalent Services for Complex User Requests
pp. 1101
Cloud Resources Reassignment Based on CPU and Bandwidth Correlation
pp. 1114
Elixir: An Agent for Supporting Elasticity in Docker Swarm
pp. 1126
A Distributed Decision Making Model for Cloudlets Network: A Fog to Cloud Computing Approach
pp. 1138
Data Center Resource Provisioning Using Particle Swarm Optimization and Cuckoo Search: A Performance Comparison
pp. 1150
A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination
pp. 1162
A Model-Driven Approach to Unravel the Interoperability Problem of the Internet of Things
pp. 1176
Towards an Approach for Validating the Internet-of-Transactional-Things
pp. 1189
iZen: Secure Federated Service Oriented Architecture for the Internet of Things in the Cloud
pp. 1201
iSWoT: Service Oriented Architecture in the Cloud for the Semantic Web of Things
pp. 1215
Identity and Access Management for IoT in Smart Grid
pp. 1227
Information Centric Protocols to Overcome the Limitations of Group Communication in the IoT
pp. 1239
Prevention of DDoS Attacks in IoT Networks
pp. 1251
Dynamic Hierarchical Security Access Control with Time-Limited Method in Electronic Medical Record
pp. 1265
Development of an Information Security Management Model for Enterprise Automated Systems
pp. 1278
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email
pp. 1291
RePAD: Real-Time Proactive Anomaly Detection for Time Series
pp. 1303
An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts
pp. 1319
Greybox Fuzzing Based on Ant Colony Algorithm
pp. 1330
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use
pp. 1341
Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-Based Detection
pp. 1355
New Programmable Data Plane Architecture Based on P4 OpenFlow Agent
pp. 1368
Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation
pp. 1383
Using Four Modalities for Malware Detection Based on Feature Level and Decision Level Fusion
pp. 1397
Intrusion Detection Using ASTDs
pp. 1412
On the File Recovery in Systems Infected by Ransomware
pp. 1426
An Improved Fast Correlation Attack on Fruit-80
pp. 1437
A Long-Lasting Reinforcement Learning Intrusion Detection Model
pp. 1449
Context-Aware and Dynamic Role-Based Access Control Using Blockchain
pp. 1461
A Framework for Classifying Web Attacks While Respecting ML Requirements
pp. 1474
Anomaly Detection and Extra Tree Regression for Assessment of the Remaining Useful Life of Lithium-Ion Battery
Similar content
5,134
Requirements for distributed task placement in the fog
Authors:
Reinout Eyckerman
,
Siegfried Mercelis
,
Johann M. Marquez-Barja
…
Intrusion Detection for Cyber–Physical Systems Using Generative Adversarial Networks in Fog Environment
Authors:
Paulo Freitas de Araujo-Filho
,
Georges Kaddoum
,
Divanilson R. Campelo
…
Fog water harvesting in Ifni, Morocco.
Authors:
M.V. Marzol
,
J.L. SÁNCHEZ-MEGÍA
See all similar