2015 3rd International Conference on Future Internet of Things and Cloud最新文献

筛选
英文 中文
Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses 统计增强的数据包丢失细粒度诊断
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.47
Daniele Midi, A. Tedeschi, F. Benedetto, E. Bertino
{"title":"Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses","authors":"Daniele Midi, A. Tedeschi, F. Benedetto, E. Bertino","doi":"10.1109/FiCloud.2015.47","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.47","url":null,"abstract":"Packet losses are an important class of adverse events in Wireless Sensor Networks (WSNs), they can be caused by either a compromised or misbehaving node, or an attack focused on the wireless links of the network. Understanding the underlying cause is critical for the deployment of effective response measures aimed at restoring the network functionality. Shebaro et al. [9] proposed an initial approach for fine-grained analysis (FGA) of packet losses, and implemented and evaluated a tool based on it. Such approach profiles the wireless links between the nodes using resident metrics, such as the received signal strength indicator (RSSI) and the link quality indicator (LQI) for every packet, in order to achieve an accurate diagnosis of their root causes. The accuracy of their approach relies on the correct choice of some system parameters and thresholds, and empirically-determined values such as those proposed in their work might not always be optimal. Moreover, to reduce the burden on the network administrator, their approach uses a single threshold value set for the entire WSN, which can be suitable for some neighborhoods but not appropriate for others. In this work, we design an approach that builds a statistical model for determining optimal system thresholds by exploiting the variances of RSSI and LQI. Our model also has the advantage of allowing the setting of an individual threshold for each link. We have validated our approach through extensive MATLAB simulations based on real sensor data, showing that our model is accurate and its system parameters lead to an optimally-accurate fine-grained analysis of the underlying causes of packet losses.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115924271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Hitchhikers Guide to Sharing Graph Data 共享图形数据的搭便车指南
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.76
M. Roughan, Simon Jonathan Tuke
{"title":"The Hitchhikers Guide to Sharing Graph Data","authors":"M. Roughan, Simon Jonathan Tuke","doi":"10.1109/FiCloud.2015.76","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.76","url":null,"abstract":"A graph is used to represent data in which the relationships between the objects in the data are at least as important as the objects themselves. Over the last two decades nearly a hundred file formats have been proposed or used to provide portable access to such data. This paper seeks to review these formats, and provide some insight to both reduce the ongoing creation of unnecessary formats, and guide the development of new formats where needed.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Multipath Routing Algorithm for Device-to-Device Communications for Public Safety over LTE Heterogeneous Networks 面向LTE异构网络公共安全的设备对设备通信的安全多径路由算法
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.51
Chafika Tata, M. Kadoch
{"title":"Secure Multipath Routing Algorithm for Device-to-Device Communications for Public Safety over LTE Heterogeneous Networks","authors":"Chafika Tata, M. Kadoch","doi":"10.1109/FiCloud.2015.51","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.51","url":null,"abstract":"This article proposes a new approach for secure communications Device-to-Device (D2D) if unable to apply network coding transmissions within LTE small cells. Our new algorithm called Secure Load Balancing Selective Ad hoc On-demand Multipath Distance Vector (LBS-AOMDV) is based on a multipath coded information transmissions, Data Splitting and Data Shuffling schemes. The objective of this study is to reduce the impact of confidentiality attack within Wireless Mesh Networks (WMN) by preventing eavesdroppers to obtain significant information from those transmitted by legal users, while ensuring a high level of quality of Service (QoS) for transmitted traffic. The simulation results show that Secure LBS-AOMDV increases the level of security in the wireless network compared to the LBS-AOMDV approach without adding traffic control.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130945726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Social Opinion Mining: An Approach for Italian Language 社会舆论挖掘:意大利语的一种方法
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.52
Vito Santarcangelo, Giuseppe Oddo, Maria Pilato, Fabrizio Valenti, C. Fornaro
{"title":"Social Opinion Mining: An Approach for Italian Language","authors":"Vito Santarcangelo, Giuseppe Oddo, Maria Pilato, Fabrizio Valenti, C. Fornaro","doi":"10.1109/FiCloud.2015.52","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.52","url":null,"abstract":"Opinion Mining or Sentiment Analysis is an important Computer Science topic, that allows the discovery of the web user's attitude on one or more topics. Marketing, Social Engineering and Information Retrieval are achieved through the application of Opinion Mining on Web Data. Today Social Networks represent one of the most important places on the web for sharing information, media and opinions (26% of people have accounts on Social Networks). Integration with the opinions on social networks and social communities can improve the relevancy and quality of Opinion Mining Tools. This paper discusses how Social Networks Mining represents one of the most important tasks for Opinion Mining Systems, considering the state of art literature. Then, we will show an interesting approach based on ADJECTIVES (A), INTENSIFIERS (I) and NEGATIONS (N) (called AIN) developed for Italian. This approach is based on the use of an Italian Sentiment Thesaurus (AIN Thesaurus), developed by the authors and presented in this work.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Designing a Smart City Internet of Things Platform with Microservice Architecture 基于微服务架构的智慧城市物联网平台设计
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.55
A. Krylovskiy, M. Jahn, E. Patti
{"title":"Designing a Smart City Internet of Things Platform with Microservice Architecture","authors":"A. Krylovskiy, M. Jahn, E. Patti","doi":"10.1109/FiCloud.2015.55","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.55","url":null,"abstract":"The Internet of Things (IoT) is being adopted in different application domains and is recognized as one of the key enablers of the Smart City vision. Despite the standardization efforts and wide adoption of Web standards and cloud computing technologies, however, building large-scale Smart City IoT platforms in practice remains challenging. The dynamically changing IoT environment requires these systems to be able to scale and evolve over time adopting new technologies and requirements. In response to the similar challenges in building large-scale distributed applications and platforms on the Web, micro service architecture style has emerged and gained a lot of popularity in the industry in recent years. In this work, we share our early experience of applying the micro service architecture style to design a Smart City IoT platform. Our experience suggests significant benefits provided by this architectural style compared to the more generic Service-Oriented Architecture (SOA) approaches, as well as highlights some of the challenges it introduces.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 227
Opportunity to Leverage Information-as-an-Asset in the IoT -- The Road Ahead 在物联网中利用信息作为资产的机会——未来的道路
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.63
S. Kubler, Min-Jung Yoo, C. Cassagnes, Kary Främling, D. Kiritsis, Mark Skilton
{"title":"Opportunity to Leverage Information-as-an-Asset in the IoT -- The Road Ahead","authors":"S. Kubler, Min-Jung Yoo, C. Cassagnes, Kary Främling, D. Kiritsis, Mark Skilton","doi":"10.1109/FiCloud.2015.63","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.63","url":null,"abstract":"In traditional product companies, creating value meant identifying enduring customer needs and manufacturing well-engineered solutions. Two hundred and fifty years after the start of the Industrial Revolution, this pattern of activity plays out every day, especially in a connected world where products are no longer one-and-done. Making money is not anymore limited to physical product sales and other revenue streams become possible after the initial product sale, which are service-based information and knowledge in today's IoT (including subscriptions and apps, new analytics for cognitive capabilities...). While information and knowledge are the new oil of the IoT era, it nonetheless remains challenging to perceive and extract the real value of those assets, as information is not as tangible and concrete as physical assets. In this respect, this paper introduces the major \"laws of information\" and discusses how they can be leveraged to their full extent thanks to the IoT possibilities. Further, the paper discusses the key challenges that remain to be addressed with respect to the current IoT landscape. Finally, a set of real-life business use cases identified by the Open Platform 3.0™ Forum are presented from the information law perspective.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114977261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distributed Cloud Bursting Model Based on Peer-to-Peer Overlay 基于点对点覆盖的分布式云爆发模型
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.74
Andrii Zhygmanovskyi, N. Yoshida
{"title":"Distributed Cloud Bursting Model Based on Peer-to-Peer Overlay","authors":"Andrii Zhygmanovskyi, N. Yoshida","doi":"10.1109/FiCloud.2015.74","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.74","url":null,"abstract":"In this paper, we present an approach to building cloud bursting architecture based on the peer-to-peer infrastructure for managing services. Proposed approach is designed to address various issues of interconnecting several clouds, problems of resource provisioning, service deployment and provisioning in the hybrid cloud. To ensure robustness of our system we use peer-to-peer overlay, which was proposed by us in previous papers. Scalability of the approach is attained due to flexibility of service discovery mechanism, decentralized architecture and modular approach, which allows to leverage existing components. We argue that our approach present viable solution for managing abrupt peaks in the load and keeping service provider's QoS and SLA requirements on the desired level.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128889447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Negation-Aware Framework for Sentiment Analysis in Arabic Reviews 阿拉伯语评论情感分析的否定意识框架
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.115
R. Duwairi, Mohammad A. Alshboul
{"title":"Negation-Aware Framework for Sentiment Analysis in Arabic Reviews","authors":"R. Duwairi, Mohammad A. Alshboul","doi":"10.1109/FiCloud.2015.115","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.115","url":null,"abstract":"Sentiment analysis deals with identifying polarity orientation embedded in users' comments and reviews. It aims at discriminating positive reviews from negative ones. Sentiment is related to culture and language morphology. In this paper, we investigate the effects of language morphology on sentiment analysis in reviews written in the Arabic language. In particular, we investigate, in details, how negation affects sentiments. We also define a set of rules that capture the morphology of negations in Arabic. These rules are then used to detect sentiment taking care of negated words. Experimentations prove that our suggested approach is superior to several existing methods that deal with sentiment detection in Arabic reviews.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Novel Soft Decoding Algorithm of RLL Codes for Secure Physical-Layer Visible Light Communications 安全物理层可见光通信RLL码软译码新算法
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.26
He Wang, Sunghwan Kim
{"title":"Novel Soft Decoding Algorithm of RLL Codes for Secure Physical-Layer Visible Light Communications","authors":"He Wang, Sunghwan Kim","doi":"10.1109/FiCloud.2015.26","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.26","url":null,"abstract":"This paper considers a novel efficient soft run-length limited (RLL) decoding algorithm in visible light communication (VLC) for efficient secure data transmission. Security transmission over the VLC channel can be achieved by the means of physical-layer security techniques, however, low efficient transmission performance is long-standing issue in VLC. Conventional RLL codes are used for dimming adjustments in VLC, existed hard-input hard-output (HIHO) RLL decoding and soft-input hard-output (SIHO) RLL decoding satisfied some valuable soft information. We proposed soft RLL decoding is one of soft-input soft-output (SISO) RLL decoding. In our receiver model, the posteriori probability matrix which contains all symbol probabilities is produced by the new RLL decoder, and it can be matched as the input of the soft RS decoder to enhance the throughput in the VLC system. Simulation results show that the BER and FER performances of our proposed method are always better than those of HIHO RLL decoding algorithm and SIHO RLL decoding algorithm.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130492224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Burst Based Real-Time Event Detection Using Location Dependent Corpora 基于位置相关语料库的改进突发实时事件检测
2015 3rd International Conference on Future Internet of Things and Cloud Pub Date : 2015-08-24 DOI: 10.1109/FiCloud.2015.131
J. Nützel, Frank Zimmermann
{"title":"Improved Burst Based Real-Time Event Detection Using Location Dependent Corpora","authors":"J. Nützel, Frank Zimmermann","doi":"10.1109/FiCloud.2015.131","DOIUrl":"https://doi.org/10.1109/FiCloud.2015.131","url":null,"abstract":"This paper describes an approach to detect automatically events in real-time by analyzing big data streams coming from a social network. The social network Twitter will be used for experiments because of its easy to use API and messages having positioning data. The described event detection algorithm is a burst-based event detection methods extended by a dynamically adapted reference corpus. The usage of location dependent corpora allows also detecting the location of the found events.","PeriodicalId":182204,"journal":{"name":"2015 3rd International Conference on Future Internet of Things and Cloud","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121576092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信