DeepAI AI Chat
Log In Sign Up

Discovery and capabilities of guard proxies for CoRE networks

by   Christian Amsüss, et al.

Constrained RESTful Environments tolerate and even benefit from proxy services. We explore the concept of proxies installed at entry points to constrained networks without any unified management. We sketch proxies of different levels of intrusiveness into applications, their announcement and discovery, and compare their theoretical capabilities in mitigating the effects of undesired traffic that can otherwise exhaust the environment's constrained resources.


page 1

page 2

page 3

page 4


Automated License Plate Recognition for Resource-Constrained Environments

The incorporation of deep-learning techniques in embedded systems has en...

Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments

Decision making in large scale urban environments is critical for many a...

Gain More for Less: The Surprising Benefits of QoS Management in Constrained NDN Networks

Quality of Service (QoS) in the IP world mainly manages forwarding resou...

On the Computational Power of Energy-Constrained Mobile Robots: Algorithms and Cross-Model Analysis

We consider distributed systems of identical autonomous computational en...

Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata

We propose an approach that connects recurrent networks with different o...