نتایج جستجو برای: end to end
تعداد نتایج: 10658428 فیلتر نتایج به سال:
Macroprogramming—the technique of specifying the behavior of the system, as opposed to the constituent nodes—provides application developers with high level abstractions that alleviate the programming burden in developing wireless sensor network (WSN) applications. However, as the semantic gap between macroprogramming abstractions and node-level code is considerably wider than in traditional pr...
Personal telehealth is in rapid development with innovative emerging applications like disease management. With personal telehealth people participate in their own care supported by an open distributed system with health services. This poses new end-to-end security and privacy challenges. In this paper we introduce new end-to-end security requirements and present a design for consent management...
While individual components for semantic data integration are commonly available, end-to-end solutions are rare. We demonstrate DataOps, a seamless Anything-to-RDF semantic data integration toolkit. DataOps supports the integration of both semantic and non-semantic data from an extensible host of different formats. Setting up data sources end-to-end works in three steps: (1) accessing the data ...
We introduce RelNet: a new model for relational reasoning. RelNet is a memory augmented neural network which models entities as abstract memory slots and is equipped with an additional relational memory which models relations between all memory pairs. The model thus builds an abstract knowledge graph on the entities and relations present in a document which can then be used to answer questions ...
Robust measurements of network dynamics are increasingly important to the design and operation of large internetworks like the Internet. However, administrative diversity makes it impractical to monitor every link on an end-to-end path. At the same time, it is difficult to determine the performance characteristics of individual links from end-to-end measurements of unicast traffic. In this pape...
Vehicular ad-hoc networks (VANETs) aim to increase the safety of passengers by making information available beyond the driver’s knowledge. The challenging properties of VANETs such as their dynamic behavior and intermittently connected feature need to be considered when designing a reliable communication protocol in a VANET. In this study, we propose an epidemic and density adaptive protocol fo...
The application of ontologies in information systems is becoming increasingly prevalent. In particular, the use of ontologies as a conceptual view for the purpose of accessing information stored in underlying data repositories can increase the effectiveness of mechanisms for information querying and browsing. However, the process of ontology construction requires expertise in DLs, which is a sc...
Despite incredible recent advances in machine learning, building machine learning applications remains prohibitively time-consuming and expensive for all but the best-trained, best-funded engineering organizations. This expense comes not from a need for new and improved statistical models but instead from a lack of systems and tools for supporting end-to-end machine learning application develop...
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
The use of converge-cast traffic and in-network processing to minimize the amount of transmitted data is a frequently used approach to increase the lifetime of a wireless sensor network (WSN). Consequently when aiming at security for WSNs, one has to focus primarily on protecting this type of traffic. Some recent proposals support the encryption of convergecast traffic with in-network processin...
This study examines the effect of jitter and end-to-end delay happen in the transmission of real time applications. The study analyzes the performance during sending and receiving of voice and video packets. The proposed technique is applied on the buffer at the receiver side which divides the incoming packets into same size chunks. The end-to-end delay and jitter is high when the packet size i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید