Articles de revista: Recent submissions
Now showing items 1-12 of 29
-
Cybersecurity in ict supply chains: Key challenges and a relevant architecture
(2021-09-01)
Article
Open AccessThe specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, ... -
Managing the cloud continuum: lessons learnt from a real fog-to-cloud deployment
(2021-05-01)
Article
Open AccessThe wide adoption of the recently coined fog and edge computing paradigms alongsideconventional cloud computing creates a novel scenario, known as the cloud continuum, whereservices may benefit from the overall set of ... -
The dilating method to obtain dense cayley digraphs on finite abelian groups
(2021-01-01)
Article
Open AccessA geometric method for obtaining an infinite family of Cayley digraphs of constant density on finite abelian groups is presented. The method works for any given degree d ≥ 2, and it is based on consecutive dilates of a ... -
Data-flow driven optimal tasks distribution for global heterogeneous systems
(Elsevier, 2021-07)
Article
Open AccessAs a result of advances in technology and highly demanding users expectations, more and more applications require intensive computing resources and, most importantly, high consumption of data distributed throughout the ... -
On the optimality of concurrent container clusters scheduling over heterogeneous smart environments
(Elsevier, 2021-05-01)
Article
Open AccessSmart environments rely on the cloud for most computation activities; however, leveraging the availability of resources at the edge could complement the cloud capabilities to provide a resources continuum spectrum that ... -
Towards user-centric, switching cost-aware fog node selection strategies
(Elsevier, 2021-04-01)
Article
Open AccessIn order to address high latency issues that may arise when executing timecritical applications at the cloud side, the novel fog computing paradigm has emerged, thus enabling the execution of such applications within ... -
Dootrips: a CO2-neutral global transportation system based on collaboration
(2014)
Article
Open AccessWith more than 30 million articles in 287 languages, Wikipedia allows volunteers from around the world make contributions towards the creation of the most complete encyclopedia ever written by ... -
An IIoT based ICS to improve safety through fast and accurate hazard detection and differentiation
(Institute of Electrical and Electronics Engineers (IEEE), 2020-11-25)
Article
Open AccessSafety and security of Industrial Control Systems (ICS) applied in many critical infrastructures is essential. In these systems, hazards can be due either to system failure or cyber-attacks factors. Accurate hazard detection ... -
Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios
(Elsevier, 2020-08-01)
Article
Open AccessThe evolution of the Internet of Things (IoT) is imposing many distinct challenges, particularly to guarantee both wide and global systems communication, and to ensure an optimal execution of services. To that end, IoT ... -
Essentiality of managing the resource information in the coordinated fog-to-cloud paradigm
(2019-12-26)
Article
Open AccessFog-to-cloud (F2C) computing is an emerging computational platform. By combing the cloud, fog, and IoT, it provides an excellent framework for managing and coordinating the resources in any smart computing domain. Efficient ... -
Fog-to-Cloud computing for farming: low-cost technologies, data exchange, and animal welfare
(2019-10-01)
Article
Open AccessCoordinated fog-to-cloud computing systems are expected to expedite the evolution of cloud-based smart farming, towards openness and data sharing, while making farming economically sustainable for smaller farms. We demonstrate ... -
A survey on mobility-induced service migration in the fog, edge, and related computing paradigms
(2019-09-01)
Article
Open AccessWith the advent of fog and edge computing paradigms, computation capabilities have been moved toward the edge of the network to support the requirements of highly demanding services. To ensure that the quality of such ...