Linked e-resources

Details

Intro
Preface
Acknowledgment
Contents
About the Authors
Chapter 1: Introduction
1.1 Industrial Internet-Centric Intelligent Resources Scheduling
1.1.1 Related Work
1.1.2 Edge-Enabled IoT Service Orchestration Framework
1.1.3 Problem Formulation for Optimal Resource Allocation
1.2 Industrial Internet-Centric Privacy and Security
1.2.1 Security-Enforcement Technique
1.2.1.1 Securing Edge-Enabled from Attacks
1.2.1.2 Vulnerabilities of Edge-Enabled IoT
1.2.1.3 Edge-Enabled IoT Traffic Scenario
1.2.1.4 System Modeling and Analysis

Link Selection Module
Attack Detection Module
Malicious Flow Interception Module
1.2.2 Privacy-Preserving Technique
1.2.2.1 Related Work and Motivation Analysis
1.2.2.2 System Modeling and Analysis
Components
Architecture
Authentication Mechanism
1.2.2.3 Working Principle of the Proposed Technique
1.3 Introduction to Business Process Management
1.3.1 Business Process Management (BPM)
1.3.2 The Benefits and Drivers
1.3.3 The Process Lifecycle and Methodologies
1.3.4 Challenges and Best Practices in BPM
1.4 Summary
References

Chapter 2: Architecture of Industrial Internet-Centric BPM
2.1 Mobile Industrial Internet-Centric BPM
2.1.1 Introduction
2.1.2 Server Selection Example
2.1.2.1 Formulation of Server Selection Problem
2.1.2.2 Architecture
2.2 Resources Deployment in BPM
2.2.1 Introduction
2.2.2 Architecture
2.3 Business Process Scheduling Problem
2.3.1 Introduction
2.3.2 Architecture for Business Process Scheduling Problem
2.4 Summary
References
Chapter 3: Industrial-Metadata Intelligent Service for Geo-Distributed File System

3.1 Metadata Service in Geo-Distributed File System
3.2 Industrial Distributed Virtual Edge Data Center
3.3 Intelligent Metadata Service for Industrial Edge Data Center
3.4 Analysis of Industrial-Metadata Intelligent Service
3.5 Summary
References
Chapter 4: Intelligent Cooperation Technology for Multi-Access Device
4.1 D2D Cooperation in Multi-Access Transmission Network
4.2 Device Selection During Cooperative D2D Transmission
4.3 Dynamic Intelligent Decision in Multi-Path Parallel Transmission
4.4 Intelligent Multi-Access Device Cooperation in Multi-Path Network

4.5 Summary
References
Chapter 5: Deep Optimization for Storage and Computation Over Industrial Internet
5.1 Deep Learning-Empowered Industrial Internet
5.2 Attentive Model Compression for Deep Learning Model
5.3 Computation Sharing Across Multi-Application
5.4 Deep Optimization for Industrial Applications
5.5 Summary
References
Chapter 6: User Data Privacy Protection in Industrial Application
6.1 Location Data Privacy of User Over Industrial Internet
6.2 Adversary Against Location Data Privacy of User
6.2.1 Adversary Type
6.2.2 Adversary Behavior

Browse Subjects

Show more subjects...

Statistics

from
to
Export