2021 International Conference on Computer Communications and Networks (ICCCN) 2021
DOI: 10.1109/icccn52240.2021.9522204
|View full text |Cite
|
Sign up to set email alerts
|

SCoIoT: Swarm-Computations for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…By doing so, the Tangle can be synchronized between execution nodes to coordinate the execution of computations across cloud and edge environments, and thus, ensure to fulfill application demands. Further application domains which might benefit from such concept include distributed database systems, or distributed chat applications like Scuttlebutt [25,37]. We briefly discuss the potentials of the future work on Tangle Function Networking (TFN) -an extension of TCN supporting the coordination of computation state across multiple execution nodes in a distributed and transparent fashion.…”
Section: Tcn -Towards Compute-centric Architecturesmentioning
confidence: 99%
“…By doing so, the Tangle can be synchronized between execution nodes to coordinate the execution of computations across cloud and edge environments, and thus, ensure to fulfill application demands. Further application domains which might benefit from such concept include distributed database systems, or distributed chat applications like Scuttlebutt [25,37]. We briefly discuss the potentials of the future work on Tangle Function Networking (TFN) -an extension of TCN supporting the coordination of computation state across multiple execution nodes in a distributed and transparent fashion.…”
Section: Tcn -Towards Compute-centric Architecturesmentioning
confidence: 99%
“…The past few years have seen a significant rise in the number of cyber attacks across the world. With the increased digitization of business processes, home automation [12], connected cities [13] and the rise of remote work, cyber criminals have found new and sophisticated ways to exploit vulnerabilities in computer networks, computer systems and humans. From phishing scams and ransomware attacks to data breaches and identity theft, cyber attacks have become a major concern for businesses, governments, and individuals alike.…”
Section: Introductionmentioning
confidence: 99%