V Tomer, S Sharma - Future Internet, 2022 - mdpi.com
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By …
C Wang, A Rizk, M Zink - … of the 7th International Conference on …, 2016 - dl.acm.org
The application-layer based control loops of dynamic adaptive streaming over HTTP (DASH) make video bitrate selection a complex problem. In this work, we review and present new …
In today's dynamic manufacturing environments, the adoption of virtual reality (VR)-based simulation technologies to help in product and process design activities is becoming more …
In computer networking, simulations are widely used to test and analyse new protocols and ideas. Currently, there are a number of open real testbeds available to test the new …
The dynamics of the application-layer-based control loop of dynamic adaptive streaming over HTTP (DASH) make video bitrate selection for DASH a difficult problem. In this work, we …
S Sharma, A Nag, P Stynes… - … Conference on High …, 2019 - ieeexplore.ieee.org
A Mobile wireless Ad hoc NETwork (MANET) is a decentralized wireless network in which mobile wireless nodes either directly communicate with each other or communicate via other …
This book reports on a novel concept of mechanism transitions for the design of highly scalable and adaptive publish/subscribe systems. First, it introduces relevant mechanisms …
This paper introduces our project on experimental validation of intelligent Internet of Things (IoT) networks. The project is a part of the NGIAtlantic H2020 third open call to perform …
F Jelenkovic, M Tosic, V Nejkovic - Enterprise Information Systems, 2018 - Taylor & Francis
This paper investigates how semantic technologies can be used for automatic code generation with a goal to provide easier to use and more efficient working environment to …