2016 IEEE/ACM Symposium on Edge Computing (SEC) 2016
DOI: 10.1109/sec.2016.25
|View full text |Cite
|
Sign up to set email alerts
|

Poster Abstract: Smart Urban Surveillance Using Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3
1

Relationship

4
6

Authors

Journals

citations
Cited by 60 publications
(26 citation statements)
references
References 1 publication
0
26
0
Order By: Relevance
“…However, subject to the sparsity of mobile data, it is challenging to develop an effective location prediction model for an individual suspect using the existing algorithms [60][61][62][63]. In this paper, we propose a novel CMoB model to address this issue based on the …”
Section: Discussionmentioning
confidence: 99%
“…However, subject to the sparsity of mobile data, it is challenging to develop an effective location prediction model for an individual suspect using the existing algorithms [60][61][62][63]. In this paper, we propose a novel CMoB model to address this issue based on the …”
Section: Discussionmentioning
confidence: 99%
“…Cloud computing can overcome that issue by exploiting fog devices that are between the cloud and the end users, to process the data. Ning Chen et al [31] exploit the concept of fog computing to support an urban traffic monitoring system. In Huang's et al [32] work the concept of vehicular fog computing is explained along with its potential and the challenges arising with it.…”
Section: Past Related Workmentioning
confidence: 99%
“…The approach is computationally more intensive for edge devices, therefore, a fog node was used to perform a second pass on ENF estimation on the audio recordings with more robust extraction by eliminating the false alarms produced by the edge devices. The discussion of the edge-fog-cloud hierarchy is beyond the scope of this paper—interested readers may find the architecture description in our related publications [33,34,35]. Along with robust audio-based ENF extraction, video-based ENF extraction module could be added.…”
Section: Detecting Malicious Frame Injection Attacks Using Enf Sigmentioning
confidence: 99%