Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Leszek Lilien"'
Publikováno v:
Sustainable Business and IT ISBN: 9781003402558
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d95b6d69971de24b03bc66080e61044d
https://doi.org/10.4324/9781003402558-12
https://doi.org/10.4324/9781003402558-12
Autor:
Leszek Lilien, Tong Wang
Publikováno v:
Journal of Network and Computer Applications. 134:1-12
Traditional topology controls existed on wireless networks are mostly based on a deterministic link model which only takes the decisive links into consideration. All these algorithms do not utilize the benefit of wide existence of lossy links. In a m
Autor:
Mai A. Alduailij, Leszek Lilien
Publikováno v:
Opportunistic Networks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78aec21b40633153061f6715e2eea0bb
https://doi.org/10.1201/9780429453434-2
https://doi.org/10.1201/9780429453434-2
This chapter proposes trust as a basis for assuring security and privacy in oppnets. It provides background information on oppnets, including a discussion of the security and privacy challenges in oppnets. Pervasive trust foundation (PTF) provides to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b38d1e38479759360b6d091bf8246699
https://doi.org/10.1201/9780429453434-11
https://doi.org/10.1201/9780429453434-11
Publikováno v:
TrustCom/BigDataSE
Health Information Exchanges (HIEs) collect and disseminate electronic patient healthcare data (EHRs/EMRs) among different healthcare providers to improve the quality and reduce the cost of healthcare services. However, the dissemination of patient d
Autor:
Leszek Lilien, Abduljaleel Al-Hasnawi
Publikováno v:
UCC (Companion")
Some IoT data are time-sensitive and cannot be processed in clouds, which are too far away from IoT devices. Fog computing, located as close as possible to data sources at the edge of IoT systems, deals with this problem. Some IoT data are sensitive
Publikováno v:
Computer and Network Security Essentials ISBN: 9783319584232
Computer and Network Security Essentials
Computer and Network Security Essentials
We decided to use simpler definitions of security and privacy, boiling down to their most essential characteristics. Our guide was the famous Cooley’s classic definition of personal immunity as “a right of complete immunity: to be let alone” [3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe524607e2e88a248e4117e0b16e1bd9
https://doi.org/10.1007/978-3-319-58424-9_9
https://doi.org/10.1007/978-3-319-58424-9_9
Autor:
Bilal Abu Bakr, Leszek Lilien
Publikováno v:
FNC/MobiSPC
Extending lifetime of wireless sensor networks (WSNs) is one of the most critical issues in WSNs. Lifetime limitations are caused by limited energy resources. Significant extensions of WSN lifetime can be achieved by adding spare nodes. The spares ar
Autor:
Bilal Abu Bakr, Leszek Lilien
Publikováno v:
FNC/MobiSPC
Extending the period of operation ( lifetime ) of wireless sensor networks (WSNs) is one of the most critical issues. Lifetime limitations are due to limited energy resources. Available research results reveal that significant improvement in WSN life
Publikováno v:
Recent Patents on Computer Science. 6:73-81
Over the next decade, cloud computing has a good chance of becoming a widely used technology. However, many challenges face the cloud to be overcome before the average user or business team will trust their vital information with a cloud server. Most