Results 11 to 20 of about 1,071 (86)
The Internet of Things (IoT) connects smart devices to enable various intelligent services. The deployment of IoT encounters several challenges, such as difficulties in controlling and managing IoT applications and networks, problems in programming ...
Yuhong Li +9 more
semanticscholar +1 more source
Delay and Communication Tradeoffs for Blockchain Systems With Lightweight IoT Clients [PDF]
The emerging blockchain protocols provide a decentralized architecture that is suitable of supporting Internet of Things (IoT) interactions. However, keeping a local copy of the blockchain ledger is infeasible for low-power and memory-constrained devices.
Pietro Danzi +3 more
semanticscholar +1 more source
Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices [PDF]
Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism.
Pietro Danzi +3 more
semanticscholar +1 more source
Communication Aspects of the Integration of Wireless IoT Devices with Distributed Ledger Technology [PDF]
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with decentralized ones.
Pietro Danzi +6 more
semanticscholar +1 more source
Design choices for the IoT in Information-Centric Networks
This paper outlines the tradeoffs involved in utilizing Information-Centric Networking (ICN) for Internet of Things (IoT) scenarios. It describes contexts and applications where the IoT would benefit from ICN, and where a host-centric approach would be ...
Anders Lindgren +4 more
semanticscholar +1 more source
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars [PDF]
The application of decentralized reputation systems is a promising approach to ensure cooperation and fairness, as well as to address random failures and malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially vulnerable to liars. With
Boudec, Jean-Yves Le, Mundinger, Jochen
core +5 more sources
Charting an intent driven network [PDF]
The current strong divide between applications and the network control plane is desirable for many reasons; but a downside is that the network is kept in the dark regarding the ultimate purposes and intentions of applications and, as a result, is unable ...
Coulson, Geoffrey +2 more
core +3 more sources
Transport Layer Performance in 5G mmWave Cellular [PDF]
The millimeter wave (mmWave) bands are likely to play a significant role in next generation cellular systems due to the possibility of very high throughput thanks to the availability of massive bandwidth and high-dimensional antennas.
Ford, Russell +8 more
core +3 more sources
Information-aware access network selection [PDF]
Mobile devices are increasingly presented with multiple connectivity options, including WiFi hotspots, micro-/macro-cells or even other devices in device-to-device (D2D) communications.
Katsaros, KV +5 more
core +1 more source
K-core decomposition of Internet graphs: hierarchies, self-similarity and measurement biases [PDF]
We consider the $k$-core decomposition of network models and Internet graphs at the autonomous system (AS) level. The $k$-core analysis allows to characterize networks beyond the degree distribution and uncover structural properties and hierarchies due ...
Alvarez-Hamelin, José Ignacio +3 more
core +3 more sources

