Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Access control (1)
- Affective Computing (1)
- Attribute-based encryption (1)
- Attribute-based signatures (1)
- Authentication (1)
-
- Bootstrapping (1)
- Certificate management (1)
- Decentralized orchestration (1)
- Human-centered Interaction design (1)
- Immersive Virtual Environment (1)
- Internet-of-Things (1)
- Multi-site workflow orchestration (1)
- Named Data Networking (1)
- Optimization patterns (1)
- Run-time adaptation (1)
- Scientific workflow (1)
- Teacher Training (1)
- Trust management (1)
- Usability (1)
- User Experience (1)
- Virtual reality (1)
- Workflow orchestration (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Securing The Internet Of Things Communication Using Named Data Networking Approaches, Sanjeev Kaushik Ramani
Securing The Internet Of Things Communication Using Named Data Networking Approaches, Sanjeev Kaushik Ramani
FIU Electronic Theses and Dissertations
The rapid advancement in sensors and their use in devices has led to the drastic increase of Internet-of-Things (IoT) device applications and usage. A fundamental requirement of an IoT-enabled ecosystem is the device’s ability to communicate with other devices, humans etc. IoT devices are usually highly resource constrained and come with varying capabilities and features. Hence, a host-based communication approach defined by the TCP/IP architecture relying on securing the communication channel between the hosts displays drawbacks especially when working in a highly chaotic environment (common with IoT applications). The discrepancies between requirements of the application and the network supporting the …
Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre
Interactive Virtual Training: Implementation For Early Career Teachers To Practice Classroom Behavior Management, Alban Delamarre
FIU Electronic Theses and Dissertations
Teachers that are equipped with the skills to manage and prevent disruptive behaviors increase the potential for their students to achieve academically and socially. Student success increases when prevention strategies and effective classroom behavior management (CBM) are implemented in the classroom. However, teachers with less than 5 years of experience, early career teachers (ECTs), are ill equipped to handle disruptive students. ECTs describe disruptive behaviors as a major factor for stress given their limited training in CBM. As a result, disruptive behaviors are reported by ECTs as one of the main reasons for leaving the field.
Virtual training environments (VTEs) …
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
FIU Electronic Theses and Dissertations
Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …