Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Bit, Sipra Das"'
Publikováno v:
IEEE Transactions on Network and Service Management, 25 January 2023
Industrial Internet of Things (IIoT) opens up a challenging research area towards improving secure data sharing which currently has several limitations. Primarily, the lack of inbuilt guarantees of honest behavior of participating, such as end-users
Externí odkaz:
http://arxiv.org/abs/2301.09761
Recently collaborative learning is widely applied to model sensitive data generated in Industrial IoT (IIoT). It enables a large number of devices to collectively train a global model by collaborating with a server while keeping the datasets on their
Externí odkaz:
http://arxiv.org/abs/2203.11914
Autor:
Pal, Tamal, Bit, Sipra Das
Publikováno v:
In Entertainment Computing January 2025 52
With the rapid growth of Vehicular Ad-Hoc Networks (VANETs), huge amounts of road condition data are constantly being generated and sent to the cloud for processing. However, this introduces a significant load on the network bandwidth causing delay i
Externí odkaz:
http://arxiv.org/abs/2111.11885
In recent times researchers have found several security vulnerabilities in the Routing Protocol for Low power and Lossy network (RPL), amongst which rank attack is a predominant one causing detrimental effects on the network by creating a fake topolo
Externí odkaz:
http://arxiv.org/abs/2011.12996
The advent of Industrial IoT (IIoT) along with Cloud computing has brought a huge paradigm shift in manufacturing industries resulting in yet another industrial revolution, Industry 4.0. Huge amounts of delay-sensitive data of diverse nature are bein
Externí odkaz:
http://arxiv.org/abs/2005.07147
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Pal, Tamal, Bit, Sipra Das
Publikováno v:
In Journal of Visual Communication and Image Representation July 2020 70
Publikováno v:
Social Network Analysis and Mining
In the aftermath of a disaster event, it is of utmost important to ensure efficient allocation of emergency resources (e.g. food, water, shelter, medicines) to locations where the resources are needed (need-locations). There are several challenges in
Publikováno v:
In Computer Communications 2011 34(11):1294-1306