|
|
|
Aleksandar Vekic, Jelena Borocki, Angela Fajsi
Research Question: This paper explores the potential of new start-ups and spin-offs within the university capacity and their impact on the process of creating an entrepreneurial ecosystem. Motivation: The research presented in this paper is motivated by ...
ver más
|
|
|
|
|
|
|
|
Patrick Toman, Nalini Ravishanker, Nathan Lally and Sanguthevar Rajasekaran
With the advent of the ?Internet of Things? (IoT), insurers are increasingly leveraging remote sensor technology in the development of novel insurance products and risk management programs. For example, Hartford Steam Boiler?s (HSB) IoT freeze loss progr...
ver más
|
|
|
|
|
|
|
Atik Kulakli and Cenk Lacin Arikan
In the era of the Internet of Things, innovative business model initiatives continue to deepen, and the trend of search domains continues to expand. This paper aims to scientifically analyze research trends of the Internet of Things in relation to Busine...
ver más
|
|
|
|
|
|
|
Ronny Seiger, Marco Franceschetti and Barbara Weber
The increasing number of IoT devices equipped with sensors and actuators pervading every domain of everyday life allows for improved automated monitoring and analysis of processes executed in IoT-enabled environments. While sophisticated analysis methods...
ver más
|
|
|
|
|
|
|
Dimitris Koryzis, Dionisis Margaris, Costas Vassilakis, Konstantinos Kotis and Dimitris Spiliotopoulos
Exploitation and use of disruptive technologies, such as the Internet of Things, recommender systems, and artificial intelligence, with an ambidextrous balance, are a challenge, nowadays. Users of the technologies, and stakeholders, could be part of a ne...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|
|
|
|
Yuancheng Li and Yongtai Qin
In today?s business environment, reducing costs is crucial due to the variety of Internet of Things (IoT) devices and security infrastructure. However, applying security measures to complex business scenarios can lead to performance degradation, making i...
ver más
|
|
|
|
|
|
|
Pawel Fic, Adam Czornik and Piotr Rosikowski
This article aims to present the real-world implementation of an anomaly detection system of a hydraulic power unit. Implementation involved the Internet of Things approach. A detailed description of the system architecture is provided. The complete path...
ver más
|
|
|
|
|
|
|
Peter R. J. Trim, Yang-Im Lee and An Vu
Social media usage is a direct result of Internet connectivity and is gaining increased prominence in business-to-consumer (B2C), business-to-business (B2B), and consumer-to-business (C2B) relationship building, which is allowing marketers to devise and ...
ver más
|
|
|
|