Generic proxy endpoints using protocol tunnels including life cycle management and examples for distributed cloud native services and applications

SM Perng, A Joshi, AD Advani - US Patent 11,736,585, 2023 - Google Patents
Abstract Applications or Agents or Administrators can communicate with services and/or
applications at hosted and/or remote locations via proxy service or application endpoints …

Upgrade systems for service domains

A Joshi, K Thomas, G Poothia, NK Singh - US Patent 11,726,764, 2023 - Google Patents
Non-transitory computer readable media are encoded with instructions which, when
executed by one or more processors of a central computing system, cause the central …

Internet of Things: An Overview

S Khare, M Totaro - Soft Computing and Signal Processing: Proceedings …, 2020 - Springer
Abstract The Internet of Things (IoT), which has digitized the physical world, has received
considerable attention recently. IoT applications such as smart fridge, smart hospitals, and …

Common services model for multi-cloud platform

A Joshi, G Poothia, HF Koehler, NK Singh… - US Patent …, 2023 - Google Patents
2021-07-31 Assigned to Nutanix, Inc. reassignment Nutanix, Inc. ASSIGNMENT OF
ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SINGH, NAOREM …

Cyber Security in Internet of Things-Based Edge Computing: A Comprehensive Survey

S Kumari, A Thompson, S Tiwari - Emerging Technologies and …, 2024 - igi-global.com
With the rapid growth of the internet of things (IoT) and the emergence of edge computing,
new opportunities and challenges have arisen in the realm of cyber security. This work …

Security and Performance Analysis of Edge Computing in IoT

R Ghadiri, M Elhajj - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a ubiquitous part of our daily lives, with millions of
sensors and devices gathering and exchanging data through complex networks. To address …

Artificial Intelligence to Analyze Huge Amounts of Juridical Documents via Edge Computing

G Fulciniti, A Kabli, M Cannataro… - Proceedings of the …, 2023 - dl.acm.org
The constant and continuous development of new technologies for the automatic processing
of information has led to a massive growth of data and information in various areas that …

An SLR on Edge Computing Security and possible threat protection

H Kalariya, K Shah, V Patel - arXiv preprint arXiv:2212.04563, 2022 - arxiv.org
Mobile and Internet of Things devices are generating enormous amounts of multi-modal
data due to their exponential growth and accessibility. As a result, these data sources must …

A Hands-on University Short Course for Edge AI

I Stoitsis, P Amanatidis, T Lagkas… - Proceedings of the 26th …, 2022 - dl.acm.org
This paper aims to present a hands-on short course for Edge AI to university students of
Computer Science and Engineering departments. Edge Computing is a modern, distributed …

NoD: A Neural Network-Over-Decoder for Edge Intelligence

AF Ajirlou, F Kenarangi, E Shapira… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
The ubiquitous applications of the Internet of Things (IoT) devices and the increasing
computational capabilities of neural networks (NNs) have led to a new era of edge …