Quo vadis?: persuasive computing using real time queue information
Abstract
References
Index Terms
- Quo vadis?: persuasive computing using real time queue information
Recommendations
Security Aspects of Military Sensor-Based Defence Systems
TRUSTCOM '13: Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsThe Australian Defence Force has IMAP and JMAP to perform planning prior to the deployment of forces, but due to the dynamic nature of modern warfare there is a knowledge and security gap for on-ground forces during the execution of an operation. Multi-...
Decentralised priority-based shortest job first queue model for IoT gateways in fog computing
An increased growth in time-critical IoT applications, led to a rise in real-time resource requirements. The stringent deadlines on latency have made IoT applications move out from far away cloud servers to distributed fog computing devices infrastructure ...
Mathematical Model of LTE Cells with Machine-Type and Broadband Communications
AbstractWe present a queuing system with elastic and inelastic jobs for the analysis of the joint transmission of traffic from machine-type and broadband communications in an LTE cell. The elastic jobs arriving in the system form a Markovian Arrival ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Fahim Kawsar,
- Program Chairs:
- Ulf Blanke,
- Afra Mashhadi
Sponsors
- IEEE IoT: IEEE Internet of Things
In-Cooperation
Publisher
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Brussels, Belgium
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- IEEE IoT
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 60Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in