Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. .
Computer communication systems. --- Computer security. --- Mobile computing. --- Computer networks --- Application software. --- Computer Communication Networks. --- Privacy. --- Mobile Computing. --- Mobile and Network Security. --- Computer Applications. --- Security measures. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Context-aware computing --- Portable computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures
Choose an application
Since the 1980s, mobile communication has undergone major transitions from 1G to 4G, at a rate of roughly one generation per decade. And the next upgrade is set to come soon, with 5G heralding a new era of large-bandwidth Internet, and a multi-connection, low-latency Internet of Everything. 5G technology will be the standard for next-generation mobile Internet, and it will not only enhance the individual user’s experience, but also provide technical support for artificial-intelligence-based applications, such as smart manufacturing, smart healthcare, smart government, smart cities and driverless cars. As a result, 5G is regarded as the “infrastructure” of the industrial Internet and artificial intelligence and both China and the United States are striving to become the 5G leader and spearhead this new generation of international mobile communication standards. Though trade tensions between China and the United States continue to escalate, with products ranging from soybeans to mobile phones and automobiles being affected, 5G technology may be the true cause of trade wars between the world’s top two economies. In short, 5G will change not only society, but also international trade patterns. This book describes various 5G scenarios, changes and values; explains the standards, technologies and development directions behind 5G; and explores new models, new formats and new trends in 5G-based artificial intelligence.
Computer communication systems. --- Computers. --- Information theory. --- Computer Communication Networks. --- Information Systems and Communication Service. --- Computing Milieux. --- Information and Communication, Circuits. --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- 5G mobile communication systems. --- Computer networking & communications.
Choose an application
Mathematical control systems --- Computer architecture. Operating systems --- Computer. Automation --- computers --- computernetwerken --- informatietheorie
Choose an application
Since the 1980s, mobile communication has undergone major transitions from 1G to 4G, at a rate of roughly one generation per decade. And the next upgrade is set to come soon, with 5G heralding a new era of large-bandwidth Internet, and a multi-connection, low-latency Internet of Everything. 5G technology will be the standard for next-generation mobile Internet, and it will not only enhance the individual user’s experience, but also provide technical support for artificial-intelligence-based applications, such as smart manufacturing, smart healthcare, smart government, smart cities and driverless cars. As a result, 5G is regarded as the “infrastructure” of the industrial Internet and artificial intelligence and both China and the United States are striving to become the 5G leader and spearhead this new generation of international mobile communication standards. Though trade tensions between China and the United States continue to escalate, with products ranging from soybeans to mobile phones and automobiles being affected, 5G technology may be the true cause of trade wars between the world’s top two economies. In short, 5G will change not only society, but also international trade patterns. This book describes various 5G scenarios, changes and values; explains the standards, technologies and development directions behind 5G; and explores new models, new formats and new trends in 5G-based artificial intelligence.
Mathematical control systems --- Computer architecture. Operating systems --- Computer. Automation --- computers --- computernetwerken --- informatietheorie
Choose an application
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.
Engineering. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Telecommunication. --- Ingénierie --- Réseaux d'ordinateurs --- Télécommunications --- Computer networks -- Reliability. --- Fault-tolerant computing. --- Routing (Computer network management). --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Computer networks --- Routing (Computer network management) --- Reliability. --- Computing, Fault-tolerant --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer communication systems. --- Electrical engineering. --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electronic digital computers --- Fault tolerance (Engineering) --- Computer system failures --- Management --- Distributed processing --- Reliability --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electric engineering --- Engineering
Choose an application
The general consensus is that BlockChain is the next disruptive technology, and Ethereum is the flagship product of BlockChain 2.0. However, coding and implementing business logic in a decentralized and transparent environment is fundamentally different from traditional programming and is emerging as a major challenge for developers. This book introduces readers to the Solidity language from scratch, together with case studies and examples. It also covers advanced topics and explains the working mechanism of smart contracts in depth. Further, it includes relevant examples that shed new light on the forefront of Solidity programming. In short, it equips readers with essential practical skills, allowing them to quickly catch up and start using Solidity programming. To gain the most from the book, readers should have already learned at least one object-oriented programming language.
Application software. --- Computer programming. --- Programming languages (Electronic computers). --- Coding theory. --- Information theory. --- Software engineering. --- Information Systems Applications (incl. Internet). --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Coding and Information Theory. --- Software Engineering. --- Computer software engineering --- Engineering --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Programming
Choose an application
This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.
Choose an application
The general consensus is that BlockChain is the next disruptive technology, and Ethereum is the flagship product of BlockChain 2.0. However, coding and implementing business logic in a decentralized and transparent environment is fundamentally different from traditional programming and is emerging as a major challenge for developers. This book introduces readers to the Solidity language from scratch, together with case studies and examples. It also covers advanced topics and explains the working mechanism of smart contracts in depth. Further, it includes relevant examples that shed new light on the forefront of Solidity programming. In short, it equips readers with essential practical skills, allowing them to quickly catch up and start using Solidity programming. To gain the most from the book, readers should have already learned at least one object-oriented programming language.
Ergodic theory. Information theory --- Mathematical control systems --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- applicatiebeheer --- apps --- computers --- programmeren (informatica) --- software engineering --- architectuur (informatica) --- informatietheorie
Choose an application
Ad hoc networks (Computer networks) --- MANETs (Computer networks) --- Mobile ad hoc networks --- Wireless ad hoc networks --- Computer networks --- Wireless communication systems --- Xarxes d'ordinadors --- Sistemes de comunicació sense fil --- Comunicació de dades sense fil (Sistemes) --- Comunicació inalàmbrica (Sistemes) --- Comunicació sense fil (Sistemes) --- Sistemes de telecomunicació sense fil --- Transmissió de dades sense fil --- Transmissió sense fil --- Sistemes de telecomunicació --- Transmissió de dades --- Bluetooth (Tecnologia) --- Sistemes de comunicacions mòbils --- Sistemes MIMO --- WAP (Protocol de xarxes d'ordinadors) --- Xarxes locals sense fil Wi-Fi --- Xarxes de sensors sense fil --- Sistemes de comunicació d'ordinadors --- Xarxes de comunicació electròniques --- Xarxes informàtiques --- Autopistes de la informació --- Xarxes de comunicacions --- Comunitats virtuals --- Encaminadors (Xarxes d'ordinadors) --- Extranets (Xarxes d'ordinadors) --- Internet de les coses --- Interoperabilitat en xarxes d'ordinadors --- Microsoft .NET --- Protocols de xarxes d'ordinadors --- Sistemes de taulers d'anuncis --- Xarxes d'àrea extensa (Xarxes d'ordinadors) --- Xarxes locals (Ordinadors) --- Gestió de xarxes d'ordinadors --- Processament distribuït de dades
Choose an application
Data privacy. --- Internet of things --- Security measures. --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Information privacy --- Information resources management --- Privacy
Listing 1 - 10 of 15 | << page >> |
Sort by
|