2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision 2015
DOI: 10.1109/cogsima.2015.7108192
|View full text |Cite
|
Sign up to set email alerts
|

Data to decision: pushing situational information needs to the edge of the network

Abstract: Obtaining a high level of situation awareness while maintaining optimal utilization of resources is becoming increasingly important, especially in the context of asymmetric warfare, where information superiority is crucial for maintaining the edge over the opponent. Obtaining an adequate level of situational information from an ISR system is dependent on sensor capabilities as well as the ability to cue the sensors appropriately based on the current information needs and the ability to utilize the collected da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 6 publications
0
17
0
Order By: Relevance
“…The importance and applicability of fog computing were assessed by Yannuzzi et al [41] and Preden et al [42] at a superficial level. In [43], the authors considered various computing paradigms inclusive of cloud computing, and investigated the feasibility of building up a reliable and fault-tolerant fog computing platform.…”
Section: Fog Computingmentioning
confidence: 99%
“…The importance and applicability of fog computing were assessed by Yannuzzi et al [41] and Preden et al [42] at a superficial level. In [43], the authors considered various computing paradigms inclusive of cloud computing, and investigated the feasibility of building up a reliable and fault-tolerant fog computing platform.…”
Section: Fog Computingmentioning
confidence: 99%
“…Form factor limitation means that the amount of computational power that can be concentrated into a device always correlates to the size of the device. Some common characteristics of fog computing are "proximity to end-users and client objectives, dense geographical distribution and local resource pooling, latency reduction for quality of service (QoS) and edge analytics/stream mining, resulting in superior user-experience and redundancy in case of failure" [Forrest Stroud ;Preden et al 2015]. One of the common goals of fog computing is to make 'big data' smaller.…”
Section: Fog Computing: An Overviewmentioning
confidence: 99%
“…This indicates that many applications employ Fog computing to do small data analytics tasks but meanwhile, still rely on Cloud computing platforms to perform large tasks, which normally cannot be done on Fog devices. There also exist a few research efforts where Fog devices will take care of almost all the data analytics tasks, such as Gazis et al [Gazis et al 2015], Kulkarni et al [Kulkarni et al 2012], Preden et al [Preden et al 2015], and Oueis et al [Oueis et al 2015]. The reasons for these include real-time local decision making [Gazis et al 2015;Preden et al 2015], privacy [Kulkarni et al 2012], and load balancing [Gazis et al 2015;Oueis et al 2015].…”
Section: Existing Research Efforts and Trendsmentioning
confidence: 99%
“…The Health fog combines the data from different sources with an adequate level of security. Preden et al combined the data design approach with fog computing to perform the computation at the edge of the network. Do et al addressed the issue of joint resource allocation and carbon footprint problem of video streaming with the help of fog computing.…”
Section: Related Workmentioning
confidence: 99%