Proceedings of the Second ACM/IEEE Symposium on Edge Computing 2017
DOI: 10.1145/3132211.3134464
|View full text |Cite
|
Sign up to set email alerts
|

Cloudpath

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(7 citation statements)
references
References 22 publications
0
5
0
1
Order By: Relevance
“…Figure 1(a) shows that the reputation value distribution of positive and negative nodes is not much different. Comparing Figure 1(b) with figure 1(a), we can see that the reputation value of positive nodes can be concentrated in the range of [12,17] by using BMBR. In contrast, the reputation value of negative nodes can be concentrated in the range of [4,10].…”
Section: Resultsmentioning
confidence: 90%
See 1 more Smart Citation
“…Figure 1(a) shows that the reputation value distribution of positive and negative nodes is not much different. Comparing Figure 1(b) with figure 1(a), we can see that the reputation value of positive nodes can be concentrated in the range of [12,17] by using BMBR. In contrast, the reputation value of negative nodes can be concentrated in the range of [4,10].…”
Section: Resultsmentioning
confidence: 90%
“…In addition to utilizing the idle resources of consumers, it is also possible to self-deploy data centers to provide content services, such as CloudPath proposed by Mortazavi et al [17], which deploys a multilayer cloud structure within the geographic scope of the network, along with IoT devices and a cloud path to a data center, deploying a chain of data centers that grow in size to provide storage resources. CloudPath supports the dynamic installation of lightweight, stateless functions and a distributed uniform storage system.…”
Section: Introductionmentioning
confidence: 99%
“…Cloudpath 11,45,46 is a framework for a hierarchical fog computing infrastructure that includes a data management system, PathStore. In PathStore, storage nodes are arranged in a tree topology, with each node running a Cassandra cluster proportioned for its capabilities.…”
Section: Fog-nativementioning
confidence: 99%
“…We show an overview of the components of fog computing infrastructure in Figure 1. We note that although fog infrastructure is often illustrated as a hierarchical tree with the cloud as its root and edge nodes as leaves, for example, by Mortazavi et al, 11 this is merely an abstracted overlay topology. We assume that in practice and with sufficient firewall configuration, servers on the Internet are able to connect and send messages to any other server, 2 possibly with varying QoS 12 …”
Section: Background and Requirementsmentioning
confidence: 99%
“…Um exemplo de uso desses recursos, neste projeto está em etapas de testes com recursos desenvolvidos para comunicação das pessoas com limitações psicomotoras por meio do reconhecimento de movimentos faciais, sendo aqui integrados por um microsserviço com a biblioteca OpenCV, a qual disponibiliza recursos de processamento de imagens e detecção de pontos característicos das faces ou outras partes pré-definidas do corpo humano (Mortazavi, Salehe, Gomes, Phillips & de Lara, 2017), (Amos, Ludwiczuk, Satyanarayanan et al, 2016). Esse tipo de recurso pode também poderá ser futuramente reutilizado por recursos planejados para o controle de acesso biométrico (Upadhyay, Rida, Gupta & Siddique, 2017) e o reconhecimento de idade, sexo ou outras propriedades fenotípicas de seres humanos (Salihbasi ć & Orehovacki, 2019), que podem estar associados à recursos de segurança da ferramenta (Sayem & Chowdhury, 2018).…”
Section: Conceitos Tecnológicos Para O Saasunclassified