Results 1 to 10 of about 567,589 (237)
Proving Properties of Rich Internet Applications [PDF]
We introduce application layer specifications, which allow us to reason about the state and transactions of rich Internet applications. We define variants of the state/event based logic UCTL* along with two example applications to demonstrate this ...
James Smith
doaj +4 more sources
Network layer solutions for a content-centric internet [PDF]
Nowadays most people exploit the Internet to get contents such as web pages, music or video files. These users only value “what” they download and are not interested about “where” content is actually stored. The IP layer does the opposite and cares about
Blefari-Melazzi N, Detti A
core +5 more sources
ID Layer for Internet of Things Based on Name-Oriented Networking
Object and service identification is considered as one of the main challenges in the field of Internet of Things (IoT), which can be solved by the introduction of the so called ID (IDentifier) layer.
Jordi Mongay Batalla +3 more
doaj +3 more sources
Layering the Internet-of-Things with Multicasting in Flow-Sensors for Internet-of-Services
Development of Internet-of-Services will be hampered by heterogeneous Internet-of-Things infrastructures, such as inconsistency in communicating with participating objects, connectivity between the ...
Rahim Rahmani, Theo Kanter
openalex +4 more sources
Research on Key Technologies and Applications of Energy Internet Blockchain [PDF]
In view of the challenges facing the current development of energy Internet, the basic theory, architecture implementation and application mode of energy blockchain technology are proposed from the communication layer, data layer and contract layer.
Zhu Xingxiong
doaj +1 more source
Towards a flexible Internet transport layer architecture [PDF]
There is a growing concern that the Internet transport layer has become less adaptive to the requirements of new applications, and that further evolution has become very difficult. This is because a fundamental assumption no longer holds: it can no longer be assumed that the transport layer is only in the scope of end-hosts.
Grinnemo, Karl-Johan +5 more
openaire +2 more sources
Research on blockchain mechanism of mine Internet of things
The mine Internet of things has the characteristics of large-scale and massive data transmission. These characteristics make the traditional network security and privacy protection methods unable to guarantee the traceability and reliability of key data.
ZHANG Liya +3 more
doaj +1 more source
A Referenced Cyber Physical System for Compressor Manufacturing [PDF]
Compressor is a typical high-end discrete product,with the shortening of product life cycle and the enhancement of the degree of product customization, the traditional compressor manufacturing system architecture cannot meet the requirements of ...
Cao Jin, Wang Junliang, Lu Junqing
doaj +1 more source
Cross-Layer Transmission Design for Tactile Internet [PDF]
Accepted by IEEE Globecom ...
She, Changyang +2 more
openaire +2 more sources
Survey on IETF 6TiSCH Industrial Internet of Things: Standards, Key Technologies and Platforms
The Internet engineering task force (IETF) is developing an IPv6-based low-power industrial Internet of things (IIoT) protocol stack called 6TiSCH, which is mainly used in complex industrial process control and automation.
YANG Wei, WANG Hao, WAN Yadong, CAO Yuanlong, LIU Qinghua
doaj +1 more source

