Pub Date : 2023-01-02DOI: 10.1007/s44227-022-00007-0
K. Surya, V. Rajam
{"title":"Novel Approaches for Resource Management Across Edge Servers","authors":"K. Surya, V. Rajam","doi":"10.1007/s44227-022-00007-0","DOIUrl":"https://doi.org/10.1007/s44227-022-00007-0","url":null,"abstract":"","PeriodicalId":42585,"journal":{"name":"International Journal of Networked and Distributed Computing","volume":"30 1","pages":"20 - 30"},"PeriodicalIF":1.7,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85670740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-09DOI: 10.1007/s44227-022-00001-6
Kenji Nozaki, T. Hochin
{"title":"Evaluation of Identification Method of Corresponding Numerical Attributes in Heterogeneous Databases Based on Instances","authors":"Kenji Nozaki, T. Hochin","doi":"10.1007/s44227-022-00001-6","DOIUrl":"https://doi.org/10.1007/s44227-022-00001-6","url":null,"abstract":"","PeriodicalId":42585,"journal":{"name":"International Journal of Networked and Distributed Computing","volume":"1 1","pages":"1 - 8"},"PeriodicalIF":1.7,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76220304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-08DOI: 10.1007/s44227-022-00003-4
Hsuan-chao Huang, Chun-Hsien Tsai, H. Lin
{"title":"Development of 5G Cyber-Physical Production System","authors":"Hsuan-chao Huang, Chun-Hsien Tsai, H. Lin","doi":"10.1007/s44227-022-00003-4","DOIUrl":"https://doi.org/10.1007/s44227-022-00003-4","url":null,"abstract":"","PeriodicalId":42585,"journal":{"name":"International Journal of Networked and Distributed Computing","volume":"168 1","pages":"9 - 19"},"PeriodicalIF":1.7,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73290123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MLP and CNN-based Classification of Points of Interest in Side-channel Attacks","authors":"Hanwen Feng, Weiguo Lin, Wenqian Shang, Jianxiang Cao, Wei Huang","doi":"10.2991/ijndc.k.200326.001","DOIUrl":"https://doi.org/10.2991/ijndc.k.200326.001","url":null,"abstract":"","PeriodicalId":42585,"journal":{"name":"International Journal of Networked and Distributed Computing","volume":"73 1","pages":"108-117"},"PeriodicalIF":1.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84377929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.2991/ijndc.k.200325.001
Myo Myint Oo, S. Kamolphiwong, T. Kamolphiwong, S. Vasupongayya
With the continuous development of networking environment, nowadays, there are many innovative technologies in computer network researches and industries. Most businesses use various mobile devices, cloud services and virtualization techniques in network environments [1]. Their usage is becoming the strongest evolution. The network programmability will be critical for business growth. Most of the today’s network types are traditional networks. The traditional network management methods are device-bydevice and system by using manual configurations [2]. All devices are controlled and managed by human. If a new network device is added to the network, the device must be first configured. As a result, the network is not flexible and cannot be easily scale.
{"title":"Analysis of Features Dataset for DDoS Detection by using ASVM Method on Software Defined Networking","authors":"Myo Myint Oo, S. Kamolphiwong, T. Kamolphiwong, S. Vasupongayya","doi":"10.2991/ijndc.k.200325.001","DOIUrl":"https://doi.org/10.2991/ijndc.k.200325.001","url":null,"abstract":"With the continuous development of networking environment, nowadays, there are many innovative technologies in computer network researches and industries. Most businesses use various mobile devices, cloud services and virtualization techniques in network environments [1]. Their usage is becoming the strongest evolution. The network programmability will be critical for business growth. Most of the today’s network types are traditional networks. The traditional network management methods are device-bydevice and system by using manual configurations [2]. All devices are controlled and managed by human. If a new network device is added to the network, the device must be first configured. As a result, the network is not flexible and cannot be easily scale.","PeriodicalId":42585,"journal":{"name":"International Journal of Networked and Distributed Computing","volume":"9 1","pages":"86-93"},"PeriodicalIF":1.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78902035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-04-01DOI: 10.2991/ijndc.k.190918.001
Yang Liu, Rui Li
Formal verification can reveal the unexposed defects in a safetycritical system. As a prominent formal verification technique, model checking is an automatic and complete verification technique of finite state systems against correctness properties, which was pioneered respectively by Clarke and Emerson [1] and by Queille and Sifakis [2] in the early 1980’s. Whereas model checking techniques focus on the absolute correctness of systems, in practice such rigid notions are hard, or even impossible, to ensure. Instead, many systems exhibit stochastic aspects [3] which are essential for among others: modeling unreliable and unpredictable system behavior (message garbling or loss), model-based performance evaluation (i.e., estimating system performance and dependability) and randomized algorithms (leader election or consensus algorithms). Automatic formal verification of stochastic systems by model checking is called stochastic model checking or probabilistic model checking [4].
{"title":"Compositional Stochastic Model Checking Probabilistic Automata via Assume-guarantee Reasoning","authors":"Yang Liu, Rui Li","doi":"10.2991/ijndc.k.190918.001","DOIUrl":"https://doi.org/10.2991/ijndc.k.190918.001","url":null,"abstract":"Formal verification can reveal the unexposed defects in a safetycritical system. As a prominent formal verification technique, model checking is an automatic and complete verification technique of finite state systems against correctness properties, which was pioneered respectively by Clarke and Emerson [1] and by Queille and Sifakis [2] in the early 1980’s. Whereas model checking techniques focus on the absolute correctness of systems, in practice such rigid notions are hard, or even impossible, to ensure. Instead, many systems exhibit stochastic aspects [3] which are essential for among others: modeling unreliable and unpredictable system behavior (message garbling or loss), model-based performance evaluation (i.e., estimating system performance and dependability) and randomized algorithms (leader election or consensus algorithms). Automatic formal verification of stochastic systems by model checking is called stochastic model checking or probabilistic model checking [4].","PeriodicalId":42585,"journal":{"name":"International Journal of Networked and Distributed Computing","volume":"5 1","pages":""},"PeriodicalIF":1.7,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82466055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}