Search results for "Computer Networks"
showing 10 items of 860 documents
Citizens’ Cybersecurity Behavior: Some Major Challenges
2022
Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. peerReviewed
Predicting lorawan behavior. How machine learning can help
2020
Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…
Development of a Low-Cost IoT System for Lightning Strike Detection and Location
2019
Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…
The Impact of Java Applications at Microarchitectural Level from Branch Prediction Perspective
2009
The portability, the object-oriented and distributed programming models, multithreading support and automatic garbage collection are features that make Java very attractive for application developers. The main goal of this paper consists in pointing out the impact of Java applications at microarchitectural level from two perspectives: unbiased branches and indirect jumps/calls, such branches limiting the ceiling of dynamic branch prediction and causing significant performance degradation. Therefore, accurately predicting this kind of branches remains an open problem. The simulation part of the paper mainly refers to determining the context length influence on the percentage of unbiased bran…
A Task Execution Scheme for Dew Computing with State-of-the-Art Smartphones
2021
The computing resources of today’s smartphones are underutilized most of the time. Using these resources could be highly beneficial in edge computing and fog computing contexts, for example, to support urban services for citizens. However, new challenges, especially regarding job scheduling, arise. Smartphones may form ad hoc networks, but individual devices highly differ in computational capabilities and (tolerable) energy usage. We take into account these particularities to validate a task execution scheme that relies on the computing power that clusters of mobile devices could provide. In this paper, we expand the study of several practical heuristics for job scheduling including executi…
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
2013
Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…
Business models and opportunity creation: How IT entrepreneurs create and develop business models under uncertainty
2015
How can entrepreneurs develop business models for markets in which the technology is constantly changing-or create business models for markets that do not exist? These are fundamental questions for information technology IT entrepreneurs, and for information systems IS scholars who seek to develop a theoretical understanding of business models. The case study presented in this paper addressed these questions, demonstrating how a small software firm developed its business model over a 15-year period in cloud gaming markets. Based on the empirical findings, a preliminary theoretical model is presented. The aim of the model is to increase scholarly understanding of how business models are crea…
Systematic literature review of E-learning capabilities to enhance organizational learning
2021
AbstractE-learning systems are receiving ever increasing attention in academia, business and public administration. Major crises, like the pandemic, highlight the tremendous importance of the appropriate development of e-learning systems and its adoption and processes in organizations. Managers and employees who need efficient forms of training and learning flow within organizations do not have to gather in one place at the same time or to travel far away to attend courses. Contemporary affordances of e-learning systems allow users to perform different jobs or tasks for training courses according to their own scheduling, as well as to collaborate and share knowledge and experiences that res…
Framework Towards a Virtual Tool for the Front-End of Employee-Driven Innovation in Healthcare
2017
This paper combines entrepreneurial behaviour and service innovation in order to investigate the use of the Idea Window; a virtual tool planned for employee-driven service development in a healthcare organisation. The empirical study investigates the tool used as a method for supporting employees' collaborative knowledge sharing in front-end of innovation in two study cases. Particularly, the research findings focus on how the virtual tool can be used for tackling the unknown - tacit knowledge, hidden possibilities, and initiatives in the context. The results are based on Idea Window entries and survey data collected in a Finnish hospital ward.
Mobile e-Services
2015
E-services are services delivered over the Internet. Such services have different proper- ties and dimensions, e.g. targeting different sectors, being accessible through different channels, or intended for frequent or infrequent use. Throughout this article we address e-services from a mobility perspective. We do this by 1) positioning mobile e-services within the research field; 2) reviewing related work on mobile e-services; and 3) present- ing and examining existing difficulties and opportunities when combining mobility and e-services. We see mobile e-services as the next generation of internet-based services and discuss important focus areas and future directions, giving extra notion to…