Search
Now showing items 1-7 of 7
PCCP: Proactive Video Chunks Caching and Processing in edge networks
(
Elsevier B.V.
, 2020 , Article)
Mobile Edge Computing (MEC) networks have been proposed to extend the cloud services and bring the cloud computing capabilities near the end-users at the Mobile Base Stations (MBS). To improve the efficiency of pushing the ...
SsHealth: Toward secure, blockchain-enabled healthcare systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system ...
Machine Learning Based Cloud Computing Anomalies Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Recently, machine learning algorithms have been proposed to design new security systems for anomalies detection as they exhibit fast processing with real-time predictions. However, one of the major challenges in machine ...
Service-Less Video Multicast in 5G: Enablers and Challenges
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The massive upsurge in production and demand of crowdsourced live streaming necessitates feasible and cost effective solutions in future cellular networks. Video multicast is one of the viable options to deliver live video ...
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication
(
Academic Press
, 2020 , Article)
To support multimedia applications, Mobile Edge Computing (MEC) servers offer storage and computing capacities to handle videos close to end-users. However, the high load in peak hours consumes the limited available bandwidth ...
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ...