SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:1999 5903 "

Sökning: L773:1999 5903

  • Resultat 1-10 av 28
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Axelsson, Carl-Anton Werner, 1981-, et al. (författare)
  • Learning How to Separate Fake From Real News : Scalable Digital Tutorials Promoting Students’ Civic Online Reasoning
  • 2021
  • Ingår i: Future Internet. - : MDPI. - 1999-5903. ; 13:3
  • Tidskriftsartikel (refereegranskat)abstract
    • With the rise of misinformation, there is a great need for scalable educational interventions supporting students’ abilities to determine the trustworthiness of digital news. We address this challenge in our study by developing an online intervention tool based on tutorials in civic online reasoning that aims to teach adolescents how to critically assess online information comprising text, videos and images. Our findings from an online intervention with 209 upper secondary students highlight how observational learning and feedback support their ability to read laterally and improve their performance in determining the credibility of digital news and social media posts. 
  •  
2.
  • Arkoulis, Stamatios, et al. (författare)
  • Misbehaviour Scenarios in Cognitive Radio Networks
  • 2010
  • Ingår i: Future Internet. - : Future Internet Editorial Office. - 1999-5903. ; 2:3-4, s. 212-237
  • Forskningsöversikt (refereegranskat)abstract
    • Recent advances in the fields of Cognitive Radio and the proliferation of open spectrum access promise that spectrum-agile wireless communication will be widespread in the near future, and will bring significant flexibility and potential utility improvements for end users. With spectrum efficiency being a key objective, most relevant research focuses on smart coexistence mechanisms. However, wireless nodes may behave selfishly and should be considered as rational autonomous entities. Selfishness, pure malice or even faulty equipment can lead to behavior that does not conform to sharing protocols and etiquette. Thus, there is a need to secure spectrum sharing mechanisms against attacks in the various phases of the sharing process. Identifying these attacks and possible countermeasures is the focus of this work.
  •  
3.
  • Ashouri, Majid, et al. (författare)
  • Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics
  • 2019
  • Ingår i: Future Internet. - : MDPI. - 1999-5903. ; 11:11, s. 235-246
  • Tidskriftsartikel (refereegranskat)abstract
    • The deployment of Internet of Things (IoT) applications is complex since many quality characteristics should be taken into account, for example, performance, reliability, and security. In this study, we investigate to what extent the current edge computing simulators support the analysis of qualities that are relevant to IoT architects who are designing an IoT system. We first identify the quality characteristics and metrics that can be evaluated through simulation. Then, we study the available simulators in order to assess which of the identified qualities they support. The results show that while several simulation tools for edge computing have been proposed, they focus on a few qualities, such as time behavior and resource utilization. Most of the identified qualities are not considered and we suggest future directions for further investigation to provide appropriate support for IoT architects.
  •  
4.
  • Bocharova, Irina, et al. (författare)
  • Low Delay Inter-Packet Coding in Vehicular Networks
  • 2019
  • Ingår i: Future Internet. - Basel : MDPI. - 1999-5903. ; 11:12
  • Tidskriftsartikel (refereegranskat)abstract
    • In Cooperative Intelligent Transportation Systems (C-ITSs), vehicles need to wirelessly connect with Roadside units (RSUs) over limited durations when such point-to-point connections are possible. One example of such communications is the downloading of maps to the C-ITS vehicles. Another example occurs in the testing of C-ITS vehicles, where the tested vehicles upload trajectory records to the roadside units. Because of real-time requirements, and limited bandwidths, data are sent as User Datagram Protocol (UDP) packets. We propose an inter-packet error control coding scheme that improves the recovery of data when some of these packets are lost; we argue that the coding scheme has to be one of convolutional coding. We measure performance through the session averaged probability of successfully delivering groups of packets. We analyze two classes of convolution codes and propose a low-complexity decoding procedure suitable for network applications. We conclude that Reed–Solomon convolutional codes perform better than Wyner–Ash codes at the cost of higher complexity. We show this by simulation on the memoryless binary erasure channel (BEC) and channels with memory, and through simulations of the IEEE 802.11p DSRC/ITS-G5 network at the C-ITS test track AstaZero.
  •  
5.
  • Casadei, Roberto, et al. (författare)
  • Pulverization in Cyber-Physical Systems : Engineering the Self-Organizing Logic Separated from Deployment
  • 2020
  • Ingår i: Future Internet. - : MDPI. - 1999-5903. ; 12:11, s. 1-28
  • Tidskriftsartikel (refereegranskat)abstract
    • Emerging cyber-physical systems, such as robot swarms, crowds of augmented people, and smart cities, require well-crafted self-organizing behavior to properly deal with dynamic environments and pervasive disturbances. However, the infrastructures providing networking and computing services to support these systems are becoming increasingly complex, layered and heterogeneous-consider the case of the edge-fog-cloud interplay. This typically hinders the application of self-organizing mechanisms and patterns, which are often designed to work on flat networks. To promote reuse of behavior and flexibility in infrastructure exploitation, we argue that self-organizing logic should be largely independent of the specific application deployment. We show that this separation of concerns can be achieved through a proposed "pulverization approach": the global system behavior of application services gets broken into smaller computational pieces that are continuously executed across the available hosts. This model can then be instantiated in the aggregate computing framework, whereby self-organizing behavior is specified compositionally. We showcase how the proposed approach enables expressing the application logic of a self-organizing cyber-physical system in a deployment-independent fashion, and simulate its deployment on multiple heterogeneous infrastructures that include cloud, edge, and LoRaWAN network elements.
  •  
6.
  • De Donno, Michele, et al. (författare)
  • Cyber-Storms Come from Clouds : Security of Cloud Computing in the IoT Era
  • 2019
  • Ingår i: Future Internet. - : MDPI. - 1999-5903. ; 11:6
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Things (IoT) is rapidly changing our society to a world where every thing is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on the security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds.
  •  
7.
  • Duradoni, Mirko, et al. (författare)
  • Reviewing Stranger on the Internet : The Role of Identifiability through "Reputation" in Online Decision Making
  • 2021
  • Ingår i: Future Internet. - : MDPI AG. - 1999-5903. ; 13:5
  • Tidskriftsartikel (refereegranskat)abstract
    • The stranger on the Internet effect has been studied in relation to self-disclosure. Nonetheless, quantitative evidence about how people mentally represent and perceive strangers online is still missing. Given the dynamic development of web technologies, quantifying how much strangers can be considered suitable for pro-social acts such as self-disclosure appears fundamental for a whole series of phenomena ranging from privacy protection to fake news spreading. Using a modified and online version of the Ultimatum Game (UG), we quantified the mental representation of the stranger on the Internet effect and tested if people modify their behaviors according to the interactors' identifiability (i.e., reputation). A total of 444 adolescents took part in a 2 x 2 design experiment where reputation was set active or not for the two traditional UG tasks. We discovered that, when matched with strangers, people donate the same amount of money as if the other has a good reputation. Moreover, reputation significantly affected the donation size, the acceptance rate and the feedback decision making as well.
  •  
8.
  • Florea, George Albert, 1990-, et al. (författare)
  • Multimodal Deep Learning for Group Activity Recognition in Smart Office Environments
  • 2020
  • Ingår i: Future Internet. - : MDPI. - 1999-5903. ; 12:8
  • Tidskriftsartikel (refereegranskat)abstract
    • Deep learning (DL) models have emerged in recent years as the state-of-the-art technique across numerous machine learning application domains. In particular, image processing-related tasks have seen a significant improvement in terms of performance due to increased availability of large datasets and extensive growth of computing power. In this paper we investigate the problem of group activity recognition in office environments using a multimodal deep learning approach, by fusing audio and visual data from video. Group activity recognition is a complex classification task, given that it extends beyond identifying the activities of individuals, by focusing on the combinations of activities and the interactions between them. The proposed fusion network was trained based on the audio-visual stream from the AMI Corpus dataset. The procedure consists of two steps. First, we extract a joint audio-visual feature representation for activity recognition, and second, we account for the temporal dependencies in the video in order to complete the classification task. We provide a comprehensive set of experimental results showing that our proposed multimodal deep network architecture outperforms previous approaches, which have been designed for unimodal analysis, on the aforementioned AMI dataset.
  •  
9.
  • Molinaro, Antonella, et al. (författare)
  • 5G-V2X Communications and Networking for Connected and Autonomous Vehicles
  • 2020
  • Ingår i: Future Internet. - Basel : MDPI. - 1999-5903. ; 12:7
  • Tidskriftsartikel (refereegranskat)abstract
    • In the last decade, there has been a surge in interest in connected and automated vehicles (CAVs) and related enabling technologies in the fields of communication, automation, computing, sensing, and positioning [...]
  •  
10.
  • Nordfeldt, Sam, et al. (författare)
  • Young Patients' Views on the Open Web 2.0 Childhood Diabetes Patient Portal : A Qualitative Study
  • 2012
  • Ingår i: Future Internet. - Basel, Switzerland : M D P I AG. - 1999-5903. ; 4:2, s. 514-527
  • Tidskriftsartikel (refereegranskat)abstract
    • Little is known about the views of young patients themselves on interactive Web portal services provided by pediatric practitioners. We aimed to explore their perceptions of a real-world diabetes portal that offers facts and contact with peers and practitioners; e.g., discussion forums, blog tools, self-care and treatment information, research updates and news from local practitioners. Twelve young patients (ages 12–21, median 15 years), one boyfriend, 7 mothers and one father each wrote an essay on their experience from use of the portal. Their essays underwent qualitative content analysis. A major theme was “Helping and facilitating daily life with diabetes”, the portal was perceived as a place where contents are interesting, inspiring and may trigger users’ curiosity. There were three subthemes; “Ease of use in my everyday life,” which includes the perception that the portal was perceived as smooth and easy to enter and navigate whenever needed; that information was easy to understand for different groups of users. “Support via an exchange of experience,” includes the ability to contact peers being regarded advantageous. Some said that just reading others’ experiences can be helpful in terms of persevering; children could find peers in the same age group. “Evidence based information,” includes the perception of the portal being a useful and trustworthy source of facts on e.g., physical activity, blood glucose, medical devices, emotional wellbeing, food and nutrition, and other aspects that impact living with diabetes. Young users expressed positive perceptions towards the interactive web portal. Such services seem to have great potential for supporting young patients and significant others - intergrading for confidence.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 28
Typ av publikation
tidskriftsartikel (26)
forskningsöversikt (2)
Typ av innehåll
refereegranskat (28)
Författare/redaktör
Vinel, Alexey, 1983- (3)
Davidsson, Paul (2)
Spalazzese, Romina (2)
Campolo, Claudia (2)
Brunström, Anna, 196 ... (1)
Weyns, Danny (1)
visa fler...
Berterö, Carina (1)
Nouri, Jalal (1)
Wu, Yongchao (1)
Li, Xiu (1)
Rajiullah, Mohammad, ... (1)
Caso, Giuseppe (1)
Kousias, Konstantino ... (1)
Alay, Özgü (1)
Boeva, Veselka, Prof ... (1)
Grahn, Håkan (1)
Casalicchio, Emilian ... (1)
Lorig, Fabian (1)
Mihailescu, Radu-Cas ... (1)
Liwicki, Marcus (1)
Gidlund, Mikael, 197 ... (1)
Torra, Vicenç (1)
Atif, Yacine, 1967- (1)
AbuKhousa, Eman (1)
El-Tahawy, Mohamed S ... (1)
Mazzara, Manuel (1)
Pioro, Michal (1)
Henriksson, Aron (1)
Afzal, Muhammad Zesh ... (1)
Ilie, Dragos (1)
Hashmi, Khurram Azee ... (1)
Pagani, Alain (1)
Stricker, Didier (1)
Wang, Wei (1)
Jiang, Lili (1)
Fitzgerald, Emma (1)
Islam, M. Sirajul, 1 ... (1)
Al-Saedi, Ahmed Abba ... (1)
Roos, Robert (1)
Dong, Yuji (1)
Rambusch, Jana (1)
Viroli, Mirko (1)
Ali, Usman (1)
De Nardis, Luca (1)
Neri, Marco (1)
Di Benedetto, Maria- ... (1)
Bucchiarone, Antonio (1)
Rabi, Maben (1)
Guanciale, Roberto (1)
Amadeo, Marica (1)
visa färre...
Lärosäte
Blekinge Tekniska Högskola (4)
Högskolan i Halmstad (3)
Linköpings universitet (3)
Malmö universitet (3)
Högskolan i Skövde (3)
Stockholms universitet (2)
visa fler...
Örebro universitet (2)
Lunds universitet (2)
Karlstads universitet (2)
Umeå universitet (1)
Kungliga Tekniska Högskolan (1)
Uppsala universitet (1)
Luleå tekniska universitet (1)
Mälardalens universitet (1)
Jönköping University (1)
Mittuniversitetet (1)
Linnéuniversitetet (1)
visa färre...
Språk
Engelska (28)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (16)
Teknik (10)
Samhällsvetenskap (4)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy