Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Governing Smart City IoT Interventions: A Complex Adaptive Systems Perspective
Digital Government: Research and Practice (DGOV), Volume 5, Issue 3Article No.: 23, Pages 1–24https://doi.org/10.1145/3660644Urban infrastructure systems (UIS) encompass physical infrastructure and human stakeholders, delivering essential services through distributed flow networks. These systems exhibit properties of Complex Adaptive Systems (CAS), such as self-organization and ...
- research-articleSeptember 2024
AI and Blockchain Enabled Future Wireless Networks: A Survey And Outlook
Distributed Ledger Technologies: Research and Practice (DLT), Volume 3, Issue 3Article No.: 22, Pages 1–30https://doi.org/10.1145/3644369Due to the explosion of mobile users and the ever-increasing heterogeneity and scale of wireless networks, traditional communication protocols and optimizing methods can not satisfy future wireless network (FWN) requirements. As promising technologies, ...
- short-paperAugust 2024
Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosPages 48–50https://doi.org/10.1145/3672202.3673737Granting access and controlling access rights for online services is challenging in a highly dynamic and large-scale systems. In particular, the secure propagation of access right delegation is a major issue. Many proposals present access control issues ...
- research-articleJuly 2024JUST ACCEPTED
Exploring the Landscape of Ubiquitous In-home Health Monitoring: A Comprehensive Survey
ACM Transactions on Computing for Healthcare (HEALTH), Just Accepted https://doi.org/10.1145/3670854Ubiquitous in-home health monitoring systems have become popular in recent years due to the rise of digital health technologies and the growing demand for remote health monitoring. These systems enable individuals to increase their independence by ...
- articleJuly 2024
Breakthrough Barriers to Knowledge Sharing Using Modern Technologies in Academic Libraries in South Africa
International Journal of Sociotechnology and Knowledge Development (IJSKD), Volume 16, Issue 1Pages 1–19https://doi.org/10.4018/IJSKD.347380In an increasingly globalized and knowledge-based economy, this study aimed to investigate the adoption of modern technologies for effective knowledge sharing and enhancing knowledge access in academic libraries. The study was underpinned by the ...
-
- posterAugust 2024
Efficient Edge Computing: Harnessing Compact Machine Learning Models for Workload Optimization
- Mohammad Reza Pour-Hosseini,
- Mahdi Abbasi,
- Bahman Javadi,
- Seifeddine Benelghali,
- Hassan Haghighi,
- Ehsan Mohammadi-Pasand,
- Parham Moradi
GECCO '24 Companion: Proceedings of the Genetic and Evolutionary Computation Conference CompanionPages 239–242https://doi.org/10.1145/3638530.3654307This paper proposes an innovative lightweight workload distribution model, TinyXCS, specifically designed for traditional edge devices, emphasizing efficiency and compactness. TinyXCS, an online model based on XCS learning classifier systems, ...
- posterJuly 2024
A STEM Approach to Teach High School Students IoT and AI Concepts: An Air Quality Example
ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 2Page 806https://doi.org/10.1145/3649405.3659498In this study, we applied STEM approach to teach high school students Internet of Things (IoT) and Artificial Intelligence (AI) concepts with an air quality example. The learning activities include assembling IoT devices for air quality detection, ...
- research-articleJuly 2024
BPNN‐based flow classification and admission control for software defined IIoT
IET Communications (CMU2), Volume 18, Issue 15Pages 882–896https://doi.org/10.1049/cmu2.12798AbstractFlow admission control (FAC) aims to efficiently manage the service requests while maximizing the network utilization. With multiple connection requests, access delay or even service interruption may occur. This paper proposes a novel FAC ...
In this paper a novel FAC approach is proposed in which the incoming flows are classified using the back propagation neural network, with eight features and five classes. The thresholds of the proposed scheme are dynamically decided by stochastic network ...
- surveyJune 2024
Blockchained Federated Learning for Internet of Things: A Comprehensive Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 10Article No.: 258, Pages 1–37https://doi.org/10.1145/3659099The demand for intelligent industries and smart services based on big data is rising rapidly with the increasing digitization and intelligence of the modern world. This survey comprehensively reviews Blockchained Federated Learning (BlockFL) that joins ...
- surveyJune 2024
Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research Challenges
ACM Computing Surveys (CSUR), Volume 56, Issue 10Article No.: 256, Pages 1–38https://doi.org/10.1145/3659097The emergence of the Internet of Things (IoT) introduced new classes of applications whose latency and bandwidth requirements could not be satisfied by the traditional Cloud Computing model. Consequently, the Internet Technology community promoted the ...
- research-articleJune 2024
Environment Aware Deep Learning Based Access Control Model
SaT-CPS '24: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical SystemsPages 81–89https://doi.org/10.1145/3643650.3659105Recently Deep Learning based Access Control (DLBAC) model has been developed to reduce the burden of access control model engineering on a human administrator, while managing accurate access control state in large, complex, and dynamic systems. DLBAC ...
- research-articleJune 2024
Process-Aware Intrusion Detection in MQTT Networks
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 91–102https://doi.org/10.1145/3626232.3653271Intrusion Detection Systems (IDS) allow for detecting malicious activities in organizational networks and hosts. As the Industrial Internet of Things (Industrial IoT) has gained momentum and attackers become process-aware, it elevates the focus on ...
- research-articleJune 2024
Reaching the Edge of the Edge: Image Analysis in Space
DEEM '24: Proceedings of the Eighth Workshop on Data Management for End-to-End Machine LearningPages 29–38https://doi.org/10.1145/3650203.3663330Satellites have become more widely available due to the reduction in size and cost of their components. As a result, there has been an advent of smaller organizations having the ability to deploy satellites with a variety of data-intensive applications ...
- research-articleJune 2024
LimitNet: Progressive, Content-Aware Image Offloading for Extremely Weak Devices & Networks
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 519–533https://doi.org/10.1145/3643832.3661856IoT devices have limited hardware capabilities and are often deployed in remote areas. Consequently, advanced vision models surpass such devices' processing and storage capabilities, requiring offloading of such tasks to the cloud. However, remote areas ...
- short-paperJune 2024
Poster: PrivaSee: Augmented Reality-Enabled Privacy Perception Visualization for Internet of Things
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 694–695https://doi.org/10.1145/3643832.3661426Internet of Things (IoT) provides a wide range of services to improve convenience and comfort in our daily lives. However, various sensors equipped on IoT devices often raise privacy concerns. Prior works on privacy focus on passive protection from the ...
- research-articleJune 2024
Channel estimation for backscatter communication systems with retrodirective arrays
IET Communications (CMU2), Volume 18, Issue 11Pages 671–678https://doi.org/10.1049/cmu2.12777AbstractBackscatter communications, which originated from World War II, have been widely applied in the logistics domain, and recently attract emerging interest from both academic and industrial circles. Here, the backscatter communication systems ...
Here, the authors consider the tag is equipped with retrodirective arrays to improve reliability and enhance communication range. The probability density function of channel coefficients is then derived. Next, a channel estimator based on Bayesian theory ...
- research-articleAugust 2024
Analyzing Toolkits for the Development of Information Support for Smart Spaces
Scientific and Technical Information Processing (SPSTIP), Volume 51, Issue 2Pages 173–182https://doi.org/10.3103/S0147688224700102Abstract—Trends in the development of smart spaces are described. Modern tools for designing the information support of smart spaces are presented, and a brief description of them, their applied methods, and their standards are given. It is concluded that ...
- research-articleMay 2024
Revolutionizing LoRa Gateway with XGate: Scalable Concurrent Transmission across Massive Logical Channels
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 482–496https://doi.org/10.1145/3636534.3649375LoRa is a promising technology that offers ubiquitous low-power IoT connectivity. With the features of multi-channel communication, orthogonal transmission, and spectrum sharing, LoRaWAN is poised to connect millions of IoT devices across thousands of ...
- research-articleMay 2024
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events
WiSec '24: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 101–112https://doi.org/10.1145/3643833.3656124Along with the increasing popularity of smart home IoT devices, more users are turning to smart home automation platforms to control and automate their IoT devices. However, IoT automation is vulnerable to spoofed event attacks. Given that IoT devices ...
- research-articleMay 2024
Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space Sensing
ACM Transactions on Internet of Things (TIOT), Volume 5, Issue 2Article No.: 14, Pages 1–26https://doi.org/10.1145/3648479Low-cost sensors have enabled a wide array of data-driven applications and insights. As a result, encountering spaces with pervasive sensing has become all but unavoidable. This creates a fundamental tension: the success of smart environments will become ...