Despite the growing popularity of virtualized services, privacy in the cloud remains an unresolved problem. Companies, such as Turbo Tax, are selling services that prepare income tax returns on-line, in the cloud. However, when the Turbo Tax computer site is compromised, all of its customer’s personal data will be released. Experience dictates that all computer sites are eventually hacked or compromised by human failures.
Read more arrow_right_altSeveral challenges persist in what concerns wireless sensor networks, the Internet of Things, and the use of these technologies in human-centric environments.
Read more arrow_right_altThe rising number of mobile devices and their increasing computational capabilities enable new interactive context-sensitive applications.
Read more arrow_right_altIn today’s vertiginous business landscape, organizations are constantly looking at ways of introducing agility and cost efficiencies.
Read more arrow_right_altRecently, the University of Leon with the support of the Spanish National Institute of Cybersecurity has established the Research Institute of Applied Sciences in Cybersecurity (RIASC). This new institute has three main missions: research, education and transfer technology in cybersecurity. In this framework, RIASC has launched (jointly with other national and international institutions) the research Project MITHRA – “Multi-distributed Intelligence Towards Higher Resilience Assets”.
Read more arrow_right_altToday the Internet, as we know it, stands as an increasingly important element in every societal domain. Never before have people (and machines) had such an amount of potential content at their fingertips (or interfaces), and different ways to share it.
Read more arrow_right_altMobile robots collaborate in order to solve efficiently the central problems in algorithmics of distributed computing like searching/exploration, rendez-vous or pattern formation.
Read more arrow_right_altMany data collection protocols have been proposed to cater for the energy-efficient flow of sensor data from distributed sources to a sink node. However, the transmission of control commands from the sink to one or only a small set of nodes in the network is generally unsupported by these protocols.
Read more arrow_right_altTraditional distance vector routing and efficient flooding-based routing can be considered the two ends of the routing continuum in wireless sensor networks. The former uses a graph metaphor to find the best paths between the end-points in a network.
Read more arrow_right_altNetworking research and development is an important field in information technology and its importance grows with the rise of the Internet and the ubiquity of worldwide communication.
Read more arrow_right_alt
Recent Comments