|
|
|
Shrisha H. S. and Uma Boregowda
The domain of information-centric networking (ICN) is expanding as more devices are becoming a part of connected technologies. New methods for serving content from a producer to a consumer are being explored, and Named Data Networking (NDN) is one of the...
ver más
|
|
|
|
|
|
|
Dependra Dhakal, Arpan Gautam, Sudipta Dey, Kalpana Sharma
Pág. 339 - 356
Named Data Networking (NDN) is a model that has been proposed by many researchers to alter the long-established IP based networking model. It derives the content centric approach rather than host-based approach. This is gaining even more traction in the ...
ver más
|
|
|
|
|
|
|
Ken Polasko, Pedro Ponce and Arturo Molina
Engineering education pushes the creation of new technology to solve community problems. The process of technology transfer promotes educational innovation in universities, a vital process that can improve citizens? quality of life in cities and rural co...
ver más
|
|
|
|
|
|
|
Luís Gameiro, Carlos Senna and Miguel Luís
In recent years we have been assisting a radical change in the way devices are connected to the Internet. In this new scope, the traditional TCP/IP host-centric network fails in large-scale mobile wireless distributed environments, such as IoT scenarios,...
ver más
|
|
|
|
|
|
|
Shabib-Ahmed Shaikha,Tarun Kumar Singhalb
Software technology is seeing enormous growth as it is used in all fields of technology. It is continuously evolving at a rapid pace and has a short span of the technological life cycle. The use of the software is not restricted only to information and c...
ver más
|
|
|
|
|
|
|
klaus Solberg Söilen
For the upcoming conference on Intelligence Studies at ICI 2020 in Bad Nauheim, Germany the focus of this issue of JISIB is on collective intelligence and foresight. The first two papers by Søilen and Almedia and Lesca deal with collective intelligence f...
ver más
|
|
|
|
|
|
|
Dohoon Kim
Most recent cyberattacks have employed new and diverse malware. Various static and dynamic analysis methods are being introduced to detect and defend against these attacks. The malware that is detected by these methods includes advanced present threat (A...
ver más
|
|
|
|
|
|
|
Shabib-Ahmed Shaikh,Tarun Kumar Singhal
The number of patents being filed around the globe in the field of information andcommunication technologies is increasing each year. Patents are seen as strategic assets forcompanies as they provide a competitive advantage and at the same time ensure fr...
ver más
|
|
|
|
|
|
|
Klaus Solberg Söilen
IT have indeed merged: new empirical data?, Vol 7, No 1 (2017) ?Business intelligence, big data andtheory? and Vol 6, No 3 (2016) ?What role does technology play for intelligence studies at the start of the21st century??. Special issues have looked at th...
ver más
|
|
|
|
|
|
|
Enrico Calandro,Chenai Chair
Pág. pp. 13 - 28 pgs.
At the beginning of 2014, in some African countries mobile operators were offering bundles of voice, SMS, and data services. This emerged by applying the OECD (Organisation for Economic Co-operation and Development) 2010 price baskets methodology, which ...
ver más
|
|
|
|