Pub Date : 2018-08-03DOI: 10.5220/0004812900720078
A. Costanzo, A. Faro, D. Giordano
This paper presents how ambient data integration is obtained in Wi-City, i.e. a project promoted by the Regional Government of Sicily that aims at supporting mobile people activities by means of intelligent applications able to generate personalized recommendations that take into account both personal and context parameters. The paper shows how this is made possible by the decreasing cost of the monitoring systems in the IOT era and by the availability of ontology engineering methods to data integration. In particular, aim of the paper is to illustrate a pervasive platform consisting of environmental sensors readily installable on the city and body sensors easily wearable by people that cooperate by means of an ambient data ontology to better support the user decisions in a smart city. Examples of how embedded consumer electronics products are used to monitor the user ambient and how developing an effective ambient data ontology are illustrated to give an implementation account of the proposed platform.
{"title":"Pervasive Ambient Intelligence Platforms in the IOT Era based on a Ubiquitous User Model Ontology - An Implementation Account","authors":"A. Costanzo, A. Faro, D. Giordano","doi":"10.5220/0004812900720078","DOIUrl":"https://doi.org/10.5220/0004812900720078","url":null,"abstract":"This paper presents how ambient data integration is obtained in Wi-City, i.e. a project promoted by the Regional Government of Sicily that aims at supporting mobile people activities by means of intelligent applications able to generate personalized recommendations that take into account both personal and context parameters. The paper shows how this is made possible by the decreasing cost of the monitoring systems in the IOT era and by the availability of ontology engineering methods to data integration. In particular, aim of the paper is to illustrate a pervasive platform consisting of environmental sensors readily installable on the city and body sensors easily wearable by people that cooperate by means of an ambient data ontology to better support the user decisions in a smart city. Examples of how embedded consumer electronics products are used to monitor the user ambient and how developing an effective ambient data ontology are illustrated to give an implementation account of the proposed platform.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-29DOI: 10.5220/0007239500000000
S. Weiss
This overview paper motivates the description of broadband sensor array problems by polynomial matrices, directly extending notation that is familiar from the characterisation of narrowband problems. To admit optimal solutions, the approach relies on extending the utility of the eigen- and singular value decompositions, by finding decompositions of such polynomial matrices. Particularly the factorisation of parahermitian polynomial matrices --- including space-time covariance matrices that model the second order statistics of broadband sensor array data --- is important. The paper summarises recent findings on the existence and uniqueness of the eigenvalue decomposition of such parahermitian polynomial matrices, demonstrates some algorithms that implement such factorisations, and highlights key applications where such techniques can provide advantages over state-of-the-art solutions
{"title":"Extending Narrowband Descriptions and Optimal Solutions to Broadband Sensor Arrays","authors":"S. Weiss","doi":"10.5220/0007239500000000","DOIUrl":"https://doi.org/10.5220/0007239500000000","url":null,"abstract":"This overview paper motivates the description of broadband sensor array problems by polynomial matrices, directly extending notation that is familiar from the characterisation of narrowband problems. To admit optimal solutions, the approach relies on extending the utility of the eigen- and singular value decompositions, by finding decompositions of such polynomial matrices. Particularly the factorisation of parahermitian polynomial matrices --- including space-time covariance matrices that model the second order statistics of broadband sensor array data --- is important. The paper summarises recent findings on the existence and uniqueness of the eigenvalue decomposition of such parahermitian polynomial matrices, demonstrates some algorithms that implement such factorisations, and highlights key applications where such techniques can provide advantages over state-of-the-art solutions","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-22DOI: 10.5220/0004900602470254
George Hatzivasilis, Apostolos Theodoridis, E. Gasparis, C. Manifavas
The evolution of embedded systems and their applications in every daily activity, derive the development of lightweight cryptography. Widely used crypto-libraries are too large to fit on constrained devices, like sensor nodes. Also, such libraries provide redundant functionality as each lightweight and ultra-lightweight application utilizes a limited and specific set of crypto-primitives and protocols. In this paper we present the ULCL crypto-library for embedded systems. It is a compact software cryptographic library, optimized for space and performance. The library is a collection of open source ciphers (27 overall primitives). We implement a common lightweight API for utilizing all primitives and a user-friendly API for users that aren’t familiar with cryptographic applications. One of the main novelties is the configurable compilation process. A user can compile the exact set of crypto-primitives that are required to implement a lightweight application. The library is implemented in C and measurements were made on PC, BeagleBone and MemSic IRIS devices. ULCL occupies 4 – 516.7KB of code. We compare our library with other similar proposals and their suitability in different types of embedded devices.
{"title":"ULCL - An Ultra-lightweight Cryptographic Library for Embedded Systems","authors":"George Hatzivasilis, Apostolos Theodoridis, E. Gasparis, C. Manifavas","doi":"10.5220/0004900602470254","DOIUrl":"https://doi.org/10.5220/0004900602470254","url":null,"abstract":"The evolution of embedded systems and their applications in every daily activity, derive the development of lightweight cryptography. Widely used crypto-libraries are too large to fit on constrained devices, like sensor nodes. Also, such libraries provide redundant functionality as each lightweight and ultra-lightweight application utilizes a limited and specific set of crypto-primitives and protocols. In this paper we present the ULCL crypto-library for embedded systems. It is a compact software cryptographic library, optimized for space and performance. The library is a collection of open source ciphers (27 overall primitives). We implement a common lightweight API for utilizing all primitives and a user-friendly API for users that aren’t familiar with cryptographic applications. One of the main novelties is the configurable compilation process. A user can compile the exact set of crypto-primitives that are required to implement a lightweight application. The library is implemented in C and measurements were made on PC, BeagleBone and MemSic IRIS devices. ULCL occupies 4 – 516.7KB of code. We compare our library with other similar proposals and their suitability in different types of embedded devices.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-22DOI: 10.5220/0003942204500458
Syed M. A. H. Jafri, L. Guang, A. Jantsch, K. Paul, A. Hemani, H. Tenhunen
Architecture and Implementation of adaptive NoC to improve performance and power consumption is presented. On platforms hosting multiple applications, hardware variations and unpredictable workloads make static design-time assignments highly sub-optimal e.g. in terms of power and performance. As a solution to this problem, adaptive NoCs are designed, which dynamically adapt towards optimal implementation. This paper addresses the architectural design of adaptive NoC, which is an essential step towards design automation. The architecture involves two levels of agents: a system level agent implemented in software on a dedicated general purpose processor and the local agents implemented as microcontrollers of each network node. The system agent issues specific instructions to perform monitoring and reconfiguration operations, while the local agents operate according to the commands from the system agent. To demonstrate the system architecture, best-effort power management with distributed voltage and frequency scaling is implemented, while meeting run-time execution requirements. Four benchmarks (matrix multiplication, FFT, wavefront, and hiperLAN transmitter) are experimented on a cycle-accurate RTL-level shared-memory NoC simulator. Power analysis with 65nm multi-Vdd library shows a significant reduction in energy consumption (from 21 % to 36 %). The synthesis also shows minimal area overhead (4 %) of the local agent compared to the original NoC switch.
{"title":"Self-adaptive Noc Power Management with Dual-level Agents - Architecture and Implementation","authors":"Syed M. A. H. Jafri, L. Guang, A. Jantsch, K. Paul, A. Hemani, H. Tenhunen","doi":"10.5220/0003942204500458","DOIUrl":"https://doi.org/10.5220/0003942204500458","url":null,"abstract":"Architecture and Implementation of adaptive NoC to improve performance and power consumption is presented. On platforms hosting multiple applications, hardware variations and unpredictable workloads make static design-time assignments highly sub-optimal e.g. in terms of power and performance. As a solution to this problem, adaptive NoCs are designed, which dynamically adapt towards optimal implementation. This paper addresses the architectural design of adaptive NoC, which is an essential step towards design automation. The architecture involves two levels of agents: a system level agent implemented in software on a dedicated general purpose processor and the local agents implemented as microcontrollers of each network node. The system agent issues specific instructions to perform monitoring and reconfiguration operations, while the local agents operate according to the commands from the system agent. To demonstrate the system architecture, best-effort power management with distributed voltage and frequency scaling is implemented, while meeting run-time execution requirements. Four benchmarks (matrix multiplication, FFT, wavefront, and hiperLAN transmitter) are experimented on a cycle-accurate RTL-level shared-memory NoC simulator. Power analysis with 65nm multi-Vdd library shows a significant reduction in energy consumption (from 21 % to 36 %). The synthesis also shows minimal area overhead (4 %) of the local agent compared to the original NoC switch.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-08DOI: 10.5220/0003353302570260
Percy Igei, C. Cugnasca, F. Junqueira, P. E. Miyagi, J. I. Garcia
Production Systems are undergoing continuous changes in order to be more competitive in a globalized market. In this scenario, there is a tendency to geographically distribute the production process to reduce development and production costs. The interaction between these components is characterized by the presence of a high number of concurrent and asynchronous processes. As a result, the development of production systems is a complex and difficult task. To cope with this complexity, this paper proposes a systematic approach for the modeling of collaborative production systems. This approach explores the potential of formal modeling language such as Colored Petri net to represent and analyze the dynamic behavior of the system. Additionally, the publish/subscribe paradigm is introduced to establish the communication in the coordination process of the system.
{"title":"Modeling of Collaborative Production Systems using Coloured Petri Nets","authors":"Percy Igei, C. Cugnasca, F. Junqueira, P. E. Miyagi, J. I. Garcia","doi":"10.5220/0003353302570260","DOIUrl":"https://doi.org/10.5220/0003353302570260","url":null,"abstract":"Production Systems are undergoing continuous changes in order to be more competitive in a globalized market. In this scenario, there is a tendency to geographically distribute the production process to reduce development and production costs. The interaction between these components is characterized by the presence of a high number of concurrent and asynchronous processes. As a result, the development of production systems is a complex and difficult task. To cope with this complexity, this paper proposes a systematic approach for the modeling of collaborative production systems. This approach explores the potential of formal modeling language such as Colored Petri net to represent and analyze the dynamic behavior of the system. Additionally, the publish/subscribe paradigm is introduced to establish the communication in the coordination process of the system.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-29DOI: 10.5220/0004305801130117
Ahmed S. Rizk, S. Aly, M. Shalan
Social networks are valuable source of information that could be used in classifying users’ emotions. In this paper, we explore the importance of certain multimodal features of social networks, other than text, that can be used in enhancing emotion detection. We study the types of posts, the degree of interaction with contacts, and the influence of contact opinions and how they tend to affect the emotions of social network users. We conducted an online survey targeting Facebook users to know how they are affected by such features. The results of our study show that status messages are the most used feature to express the social network users’ emotions, and the emotions of social network user are affected by posts and updates from friends, especially close friends. The number of likes expressed to social network users was found to positively affect their emotions. We will use such findings to prototype a system for enhanced emotion detection.
{"title":"Towards using Multimodal Features of Social Networks for Improved Contextual Emotion Detection","authors":"Ahmed S. Rizk, S. Aly, M. Shalan","doi":"10.5220/0004305801130117","DOIUrl":"https://doi.org/10.5220/0004305801130117","url":null,"abstract":"Social networks are valuable source of information that could be used in classifying users’ emotions. In this paper, we explore the importance of certain multimodal features of social networks, other than text, that can be used in enhancing emotion detection. We study the types of posts, the degree of interaction with contacts, and the influence of contact opinions and how they tend to affect the emotions of social network users. We conducted an online survey targeting Facebook users to know how they are affected by such features. The results of our study show that status messages are the most used feature to express the social network users’ emotions, and the emotions of social network user are affected by posts and updates from friends, especially close friends. The number of likes expressed to social network users was found to positively affect their emotions. We will use such findings to prototype a system for enhanced emotion detection.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-17DOI: 10.5220/0003942304590468
M. Zeller, C. Prehofer
In this work, we present an approach for self-adaptation in automotive embedded systems using a hierarchical, multi-layered control approach. We model automotive systems as a set of constraints and define a hierarchy of control loops based on different criteria. Adaptations are performed at first locally on a lower layer of the architecture. If this fails due to the restricted scope of the control cycle, the next higher layer is in charge of finding a suitable adaptation. We compare different options regarding responsibility split in multi-layered control and a version with centralized control option, in a self-healing scenario with a setup adopted from automotive in-vehicle networks. We show that a multi-layer control architecture has clear performance benefits over a central control, even though all layers work on the same set of constraints. Furthermore, we show that a responsibility split w.r.t. network topology is preferable over a functional split.
{"title":"Self-adaptation in Automotive Embedded Systems using a Multi-layered Control Approach","authors":"M. Zeller, C. Prehofer","doi":"10.5220/0003942304590468","DOIUrl":"https://doi.org/10.5220/0003942304590468","url":null,"abstract":"In this work, we present an approach for self-adaptation in automotive embedded systems using a hierarchical, multi-layered control approach. We model automotive systems as a set of constraints and define a hierarchy of control loops based on different criteria. Adaptations are performed at first locally on a lower layer of the architecture. If this fails due to the restricted scope of the control cycle, the next higher layer is in charge of finding a suitable adaptation. We compare different options regarding responsibility split in multi-layered control and a version with centralized control option, in a self-healing scenario with a setup adopted from automotive in-vehicle networks. We show that a multi-layer control architecture has clear performance benefits over a central control, even though all layers work on the same set of constraints. Furthermore, we show that a responsibility split w.r.t. network topology is preferable over a functional split.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129341140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-16DOI: 10.5220/0004876802310236
Iñaki Eguia, J. Ser
Security measurement of complex systems is a challenging task since devices deployed over the so-called System of Systems (SoS) are extremely heterogeneous and hence imply an interoperability effort in order to enable a common resilient security measurement language. Moreover, systems demand more features beyond security concept, require to preserve privacy and claim for dependable structures in order to seek a holistic and aggregated security and safety view. This paper addresses this need by capitalizing the availability of multiple security metrics through an hybrid meta-heuristic fuzzy aggregation and composition approach that takes into account the expertise compiled by the security manager, towards the generation of visual dashboards reflecting the SPD (Security, Privacy and Dependability) risk status of the system at hand.
{"title":"A Meta-heuristically Optimized Fuzzy Approach towards Multi-metric Security Risk Assessment in Heterogeneous System of Systems","authors":"Iñaki Eguia, J. Ser","doi":"10.5220/0004876802310236","DOIUrl":"https://doi.org/10.5220/0004876802310236","url":null,"abstract":"Security measurement of complex systems is a challenging task since devices deployed over the so-called System of Systems (SoS) are extremely heterogeneous and hence imply an interoperability effort in order to enable a common resilient security measurement language. Moreover, systems demand more features beyond security concept, require to preserve privacy and claim for dependable structures in order to seek a holistic and aggregated security and safety view. This paper addresses this need by capitalizing the availability of multiple security metrics through an hybrid meta-heuristic fuzzy aggregation and composition approach that takes into account the expertise compiled by the security manager, towards the generation of visual dashboards reflecting the SPD (Security, Privacy and Dependability) risk status of the system at hand.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-16DOI: 10.5220/0003941804400449
Klaus Becker, M. Zeller, Gereon Weiss
In networked embedded systems, runtime adaptive software promises an increase of flexibility, fault tolerance and extensibility. Often, this requires that software components have to be allocated dynamically to execution platforms at runtime. Hence, the platforms have to execute dynamically changing task sets. However, in real-time systems, a task set cannot be executed without previously checking its schedulability w.r.t. given timing constraints. Therefore, it has to be determined, whether or not the existing task set would be still schedulable including newly arriving tasks. In this paper, we propose a schedulability test algorithm for such systems, exploiting the situation of adding a new task to an existing task set. Therefore, we adapt existing schedulability tests to exploit the specific acceptance test use case. The benefits of the developed adaptations are shown by experimental investigations.
{"title":"Towards Efficient On-line Schedulability Tests for Adaptive Networked Embedded Real-time Systems","authors":"Klaus Becker, M. Zeller, Gereon Weiss","doi":"10.5220/0003941804400449","DOIUrl":"https://doi.org/10.5220/0003941804400449","url":null,"abstract":"In networked embedded systems, runtime adaptive software promises an increase of flexibility, fault tolerance and extensibility. Often, this requires that software components have to be allocated dynamically to execution platforms at runtime. Hence, the platforms have to execute dynamically changing task sets. However, in real-time systems, a task set cannot be executed without previously checking its schedulability w.r.t. given timing constraints. Therefore, it has to be determined, whether or not the existing task set would be still schedulable including newly arriving tasks. In this paper, we propose a schedulability test algorithm for such systems, exploiting the situation of adding a new task to an existing task set. Therefore, we adapt existing schedulability tests to exploit the specific acceptance test use case. The benefits of the developed adaptations are shown by experimental investigations.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121922328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-12DOI: 10.5220/0003404205370540
I. Lin, Rui-Kun Luo, S. Tsaur
Previously, a multi-purpose RFID tag needs one purpose stored one key in the tag and server, otherwise there will be security issues. In this paper, we propose a scheme for multi-purpose RFID tags. In this scheme, user can dynamic join-and-leave the purposes in multiple applications. Moreover, just authorized tags can be accessed. Our scheme is capable of applying multi-purpose tags, and we just need to store one key in a tag. Our approach will not cause the large computations of the database.
{"title":"A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure","authors":"I. Lin, Rui-Kun Luo, S. Tsaur","doi":"10.5220/0003404205370540","DOIUrl":"https://doi.org/10.5220/0003404205370540","url":null,"abstract":"Previously, a multi-purpose RFID tag needs one purpose stored one key in the tag and server, otherwise there will be security issues. In this paper, we propose a scheme for multi-purpose RFID tags. In this scheme, user can dynamic join-and-leave the purposes in multiple applications. Moreover, just authorized tags can be accessed. Our scheme is capable of applying multi-purpose tags, and we just need to store one key in a tag. Our approach will not cause the large computations of the database.","PeriodicalId":298357,"journal":{"name":"International Conference on Pervasive and Embedded Computing and Communication Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}