Search results for "Computer Networks"

showing 10 items of 860 documents

Citizens’ Cybersecurity Behavior: Some Major Challenges

2022

Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. peerReviewed

InternetturvallisuusComputer Networks and CommunicationsComputer scienceuhatorganisaatiottietoturvapolitiikkahakkerointikansalaisetvaikuttaminenetätyöEngineering ethicstietoturvaElectrical and Electronic EngineeringkyberturvallisuusverkkohyökkäyksetLawIEEE Security & Privacy
researchProduct

Predicting lorawan behavior. How machine learning can help

2020

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used for an extensive analysis to improve the functionality of IoT systems in terms of network performance and user services. LoRaWAN (Long Range Wide Area Network) is one of the emerging IoT technologies, with a simple protocol based on LoRa modulation. In this work, we discuss how machine learning approaches can be used to improve network performance (and if and how they can help). To this aim, we describe a methodology to process LoRaWAN packets a…

IoTComputer Networks and CommunicationsComputer scienceDecision treeChannel occupancy; cluster analysis; IoT; LoRa; LoRaWAN; machine learning; network optimization; prediction analysisMachine learningcomputer.software_genreChannel occupancyLoRalcsh:QA75.5-76.95network optimizationNetwork performanceProtocol (object-oriented programming)Profiling (computer programming)Artificial neural networkNetwork packetbusiness.industrySettore ING-INF/03 - TelecomunicazioniPipeline (software)LoRaWANHuman-Computer Interactionmachine learningprediction analysisArtificial intelligencelcsh:Electronic computers. Computer sciencebusinesscomputerCommunication channelcluster analysis
researchProduct

Development of a Low-Cost IoT System for Lightning Strike Detection and Location

2019

Lightning and thunder are some of the most violent natural phenomena. They generate a great deal of expenditure and economic loss, especially when they strike in cities. The identification of the concrete geographic area where they strike is of critical importance for emergency services in order to enhance their effectiveness by doing an intensive coverage of the affected area. To achieve this purpose at the city scale, this paper proposes the design, prototype, and validation of a distributed network of Internet of Things (IoT) devices. The IoT devices are empowered with lightning detection capabilities and are synchronized with the other devices in the sensor network. All of them cooperat…

IoTComputer Networks and CommunicationsComputer scienceLightning (connector)Real-time computing0211 other engineering and technologies02 engineering and technology01 natural scienceslaw.inventionlaw0103 physical sciencesElectrical and Electronic Engineering010306 general physicsLightning detection021110 strategic defence & security studiesThunderLightningsensor designLightning strikeHardware and ArchitectureControl and Systems EngineeringSignal Processinglightning detection and locationTrilaterationWireless sensor networkFIWAREElectronics
researchProduct

The Impact of Java Applications at Microarchitectural Level from Branch Prediction Perspective

2009

The portability, the object-oriented and distributed programming models, multithreading support and automatic garbage collection are features that make Java very attractive for application developers. The main goal of this paper consists in pointing out the impact of Java applications at microarchitectural level from two perspectives: unbiased branches and indirect jumps/calls, such branches limiting the ceiling of dynamic branch prediction and causing significant performance degradation. Therefore, accurately predicting this kind of branches remains an open problem. The simulation part of the paper mainly refers to determining the context length influence on the percentage of unbiased bran…

JavaComputer Networks and CommunicationsComputer scienceIndirect branchContext (language use)Parallel computingArityBranch predictorComputer Science ApplicationsSoftware portabilityInheritance (object-oriented programming)Computational Theory and MathematicscomputerGarbage collectioncomputer.programming_languageInternational Journal of Computers Communications & Control
researchProduct

A Task Execution Scheme for Dew Computing with State-of-the-Art Smartphones

2021

The computing resources of today’s smartphones are underutilized most of the time. Using these resources could be highly beneficial in edge computing and fog computing contexts, for example, to support urban services for citizens. However, new challenges, especially regarding job scheduling, arise. Smartphones may form ad hoc networks, but individual devices highly differ in computational capabilities and (tolerable) energy usage. We take into account these particularities to validate a task execution scheme that relies on the computing power that clusters of mobile devices could provide. In this paper, we expand the study of several practical heuristics for job scheduling including executi…

Job schedulerTK7800-8360Computer Networks and CommunicationsComputer scienceWireless ad hoc networkdew computingcomputer.software_genresmartphoneScheduling (computing)Task (computing)edge computingscheduling heuristicsHardware and ArchitectureControl and Systems EngineeringHuman–computer interactionMiddlewareSignal ProcessingElectrical and Electronic EngineeringElectronicsjob schedulingHeuristicsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Mobile devicecomputerEdge computingElectronics
researchProduct

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

2013

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…

Key distribution in wireless sensor networksComputer Networks and CommunicationsForward secrecybusiness.industryComputer scienceNode (networking)Distributed data storeProbabilistic logicKey (cryptography)businessWireless sensor networkComputer networkComputer Communications
researchProduct

Business models and opportunity creation: How IT entrepreneurs create and develop business models under uncertainty

2015

How can entrepreneurs develop business models for markets in which the technology is constantly changing-or create business models for markets that do not exist? These are fundamental questions for information technology IT entrepreneurs, and for information systems IS scholars who seek to develop a theoretical understanding of business models. The case study presented in this paper addressed these questions, demonstrating how a small software firm developed its business model over a 15-year period in cloud gaming markets. Based on the empirical findings, a preliminary theoretical model is presented. The aim of the model is to increase scholarly understanding of how business models are crea…

Knowledge managementComputer Networks and CommunicationsBusiness ruleArtifact-centric business process modelbusiness.industry05 social sciences02 engineering and technologyBusiness process modelingBusiness transformationNew business development020204 information systems0502 economics and businessBusiness analysisBusiness architecture0202 electrical engineering electronic engineering information engineeringBusinessMarketingBusiness case050203 business & managementSoftwareInformation SystemsInformation Systems Journal
researchProduct

Systematic literature review of E-learning capabilities to enhance organizational learning

2021

AbstractE-learning systems are receiving ever increasing attention in academia, business and public administration. Major crises, like the pandemic, highlight the tremendous importance of the appropriate development of e-learning systems and its adoption and processes in organizations. Managers and employees who need efficient forms of training and learning flow within organizations do not have to gather in one place at the same time or to travel far away to attend courses. Contemporary affordances of e-learning systems allow users to perform different jobs or tasks for training courses according to their own scheduling, as well as to collaborate and share knowledge and experiences that res…

Knowledge managementComputer Networks and CommunicationsComputer scienceE-learning (theory)Big dataLearning analyticsPersonalized learningE-learningArticleTheoretical Computer ScienceLearning environmentsEmpirical research0502 economics and businessLiterature reviewbusiness.industry05 social sciencesOrganizational learning050301 educationVDP::Matematikk og Naturvitenskap: 400Systematic reviewCategorizationOrganizational learningbusiness0503 education050203 business & managementSoftwareInformation Systems
researchProduct

Framework Towards a Virtual Tool for the Front-End of Employee-Driven Innovation in Healthcare

2017

This paper combines entrepreneurial behaviour and service innovation in order to investigate the use of the Idea Window; a virtual tool planned for employee-driven service development in a healthcare organisation. The empirical study investigates the tool used as a method for supporting employees' collaborative knowledge sharing in front-end of innovation in two study cases. Particularly, the research findings focus on how the virtual tool can be used for tackling the unknown - tacit knowledge, hidden possibilities, and initiatives in the context. The results are based on Idea Window entries and survey data collected in a Finnish hospital ward.

Knowledge managementComputer Networks and CommunicationsComputer scienceStrategy and ManagementContext (language use)Management Information SystemsEmpirical researchOrder (exchange)0502 economics and businessHealth carevirtual toolsService innovationta512Marketingta113Focus (computing)healthcare organizationsbusiness.industryentrepreneurial behaviour05 social sciencesWindow (computing)healthcareta3141Computer Science ApplicationsSurvey data collectionservice innovations050211 marketingbusiness050203 business & managementInternational Journal of E-Services and Mobile Applications
researchProduct

Mobile e-Services

2015

E-services are services delivered over the Internet. Such services have different proper- ties and dimensions, e.g. targeting different sectors, being accessible through different channels, or intended for frequent or infrequent use. Throughout this article we address e-services from a mobility perspective. We do this by 1) positioning mobile e-services within the research field; 2) reviewing related work on mobile e-services; and 3) present- ing and examining existing difficulties and opportunities when combining mobility and e-services. We see mobile e-services as the next generation of internet-based services and discuss important focus areas and future directions, giving extra notion to…

Knowledge managementComputer Networks and CommunicationsComputer scienceStrategy and ManagementInternet privacyInformationsteknik - DatorvetenskapMedieteknikField (computer science)Management Information SystemsAcceptance and AdoptionMobile e-ServicesMedia and Communication TechnologySurveySet (psychology)MobilityMarketingE-servicesFocus (computing)e-Servicesbusiness.industryPerspective (graphical)Information technology - Computer scienceComputer Science ApplicationsWork (electrical)The InternetState (computer science)businessInternational Journal of E-Services and Mobile Applications
researchProduct