Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2017
Big Data Mining Algorithms for Fog Computing
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 57–61https://doi.org/10.1145/3175684.3175730Fog computing is a contemporary distributed computing concept extending from Cloud computing, which pushes the data analytics to the edge of a sensor network as far as possible. It helps avoid performance bottleneck and data analytics latency at the ...
- research-articleDecember 2017
Handling Large-Scale Data using Two-Tier Hierarchical Super-Peer P2P Network
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 52–56https://doi.org/10.1145/3175684.3175726In the ever-expanding world of IoT, data has not only increased in volume and velocity but has also moved from residing in centralized nodes to distributed nodes across multiple locations. Traditional data clustering technologies, based on centralized ...
- research-articleDecember 2017
E2ABC: Energy Efficient Approaches for Extending Battery Life of Constrained Devices
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 181–185https://doi.org/10.1145/3175684.3175724IoT (Smart Home /Building /City) networks generally comprise of heterogeneous networks and devices, these devices would either be constrained or non-constrained. To amend service throughput, most of the services running on these devices are expected to ...
- research-articleDecember 2017
Multi-scale Anomaly Detection with Wavelets
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 102–108https://doi.org/10.1145/3175684.3175722We present a novel system for the detection of anomalies in streaming timeseries data, particularly that found in server and application monitoring, as well as "Internet of Things" (IoT) sensor monitoring and applications. By using the Discrete Wavelet ...
- research-articleDecember 2017
General Precautions against Security Threats for Computer Networks in SMEs: From the Perspective of Big Data and IOT
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 134–140https://doi.org/10.1145/3175684.3175702In this article, general precautions against security threats for computer network in small/medium enterprises are discussed and summarized. Discussion will also be extended beyond traditional threats onto modern new threats, and beyond traditional SMEs ...
- research-articleDecember 2017
Uncertainty Modeling in Wireless Sensor Networks
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 200–204https://doi.org/10.1145/3175684.3175692In wireless sensor networks, the certainty of the data created by a node can change due to many reasons such as drained energy, outer factors. In addition dynamic physical environment and hardware failures (broken sensor etc.) might cause sensors to ...
- research-articleDecember 2017
Performance Analytics for Scientific Distributed Computing Environments
BDIOT '17: Proceedings of the International Conference on Big Data and Internet of ThingPages 75–79https://doi.org/10.1145/3175684.3175691Scientific distributed computing environments are increasingly deployed over geographically spanning data centers using heterogeneous hardware systems. With increasing demand for storage andcollaborative tool development, scientific domains recognize ...