Standard
Available Standards (3062)
Showing standards 1801 - 2000
Standard
ISO/IEC 21972:2020 Information technology Upper level ontology for smart city indicators
This document establishes general principles and gives guidelines for an indicator uppe... Wed, Jan 1 2020Standard
ISO/IEC 21972:2020 Information technology-Upper level ontology for smart city indicators— concepts (e.g., indicator, population, cardinality); and— properties that relate concepts (e.g., cardinality_of, parameter_of_var).
This document establishes general principles and gives guidelines for an indicator uppe... Thu, Jan 30 2020Standard
Standard
ISO/IEC 27017: Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Recommendation ITU-T X.1631 | ISO/IEC 27017 provides guidelines for information securit... Wed, Jul 1 2015Standard
Standard
ISO/IEC 27032:2012Information technology -- Security techniques -- Guidelines for cybersecurity
ISO/IEC 27032:2012 provides guidance for improving the state of Cybersecurity, drawing ... Sun, Jul 1 2012Standard
ISO/IEC 30141:2018 Internet of things and related technologies
This document provides a standardized IoT Reference Architecture using a common vocabul... Sat, Aug 1 2020Standard
ISO/IEC 30141:2018Internet of Things (loT) - Reference Architecture
ISO/IEC 30141:2018 This document provides a standardized IoT Reference Architecture usi... Wed, Aug 1 2018Standard
ISO/IEC 30145-1 Smart City ICT Reference Framework - Business Process Framework
This document specifies a generic business process framework for a smart city focusing ... Sun, May 30 2021Standard
ISO/IEC 30145-2 - Smart City ICT Reference Framework -Knowledge Management Framework
This document specifies a generic knowledge management framework for a smart city, focu... Fri, Oct 30 2020Standard
ISO/IEC 30145-3:2020 - Information technology - Smart City ICT reference framework - Part 3: Smart city engineering framework
This document describes a framework, structured in layers of ICT technologies, essentia... Sun, Aug 30 2020Standard
ISO/IEC 30146:2019 - Information technology - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to... Wed, Oct 30 2019Standard
ISO/IEC 30147:2021Information technology -- Internet of things -- Methodology for trustworthiness of IoT system/service
This document provides system life cycle processes to implement and maintain trustworth... Sat, May 1 2021Standard
ISO/IEC 30163:2021System requirements of IoT/SN technology-based integrated platform for chattel asset monitoring supporting financial services
ISO/IEC 30163:2021 specifies the system requirements of an Internet of Things (IoT)/Sen... Mon, Mar 1 2021Standard
ISO/IEC 30173 ED1Digital Twin - Concepts and terminology
This document establishes terminology for Digital Twin (DT) and describes concepts in t...Standard
ISO/IEC 30182:2017, 2.10. Smart city concept model: Guidance for establishing a model for data interoperability
ISO/IEC 30182:2017 describes, and gives guidance on, a smart city concept model (SCCM) ... Tue, May 30 2017Standard
ISO/IEC 38505-1:2017Information technology -- Governance of IT -- Governance of data -- Part 1: Application of ISO/IEC 38500 to the governance of data
ISO/IEC 38505-1:2017 provides guiding principles for members of governing bodies of org... Sat, Apr 1 2017Standard
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key ...Standard
Standard
Standard
Standard
ISO/IEC AWI 5392Information technology -- Artificial intelligence -- Reference architecture of knowledge engineering
This document defines a reference architecture of Knowledge Engineering (KE) in Artific...Standard
Standard
ISO/IEC CD 23837-1.2
Information technology security techniques — Security requirements, test and evaluation...Standard
ISO/IEC CD 23837-2.2
Information technology security techniques — Security requirements, test and evaluation...Standard
ISO/IEC CD 30149 (2022)IoT Trustworthiness principles
This document provides principles for IoT trustworthiness based on ISO/IEC 30141 - IoT ...Standard
ISO/IEC DIS 21838-3 Information technology - Top-level ontologies (TLO) - Part 3: Descriptive ontology for linguistic and cognitive engineering (DOLCE)
The Descriptive Ontology for Linguistic and Cognitive Engineering (DOLCE) is a top-leve... Thu, Apr 14 2022Standard
ISO/IEC DIS 21838-4 Information technology - Top-level ontologies (TLO) - Part 4: TUpper
PSL is being incorporated into the TUpper ontology as Part 4 of ISO 21838 (Top Level On... Thu, Apr 14 2022Standard
Standard
Standard
ISO/IEC DTR 24027 Information technology - Artificial Intelligence (AI) - Bias in AI systems and AI aided decision making
Tue, Nov 30 2021Standard
Standard
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric crypto...Standard
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptograp...Standard
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of ...Standard
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-function...Standard
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechani...Standard
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techni...Standard
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e. secrets ...Standard
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities...Standard
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret info...Standard
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available...Standard
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security s...Standard
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling di...Standard
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interp...Standard
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common i...Standard
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements an...Standard
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric en...Standard
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities. ...Standard
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods ...Standard
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a ha...Standard
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowled...Standard
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on man...Working group
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes g...Standard
ISO/IEC JTC 1/SC 27/WG 1 27001:2013 - Information security management systems - Requirements
This International Standard specifies the requirements for establishing, implementin...ISO/IEC JTC 1/SC 42 - Artificial Intelligence
Standardization in the area of Artificial Intelligence Serve as the focus and proponent...Standard
Standard
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based...Standard
ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to...Standard
ISO/IEC JTC1-SC41-257 ED1Internet of Things (IoT) - Device model for IoT device interoperability
This document defines a structured description method, which describes the functionalit...Standard
ISO/IEC JTC1-SC41-262 ED1Internet of Things (IoT) - Functional architecture for resource ID interoperability
This document specifies functional requirements and architecture about the following it...Standard
ISO/IEC PWI JTC1-SC41-5Digital Twin - Reference Architecture
This document provides an overview of Digital Twin, describes the capabilities, range, ...Standard
ISO/IEC PWI JTC1-SC41-6 Guidance for IoT and Digital Twin use cases
The document defines a conceptual model for the building of use cases; specifies a use ...Standard
ISO/IEC PWI JTC1-SC41-7Digital Twin - Maturity model
This document provides a standardized generic Digital Twin maturity model, definition o...Standard
ISO/IEC PWI JTC1-SC41-8Internet of Things (IoT) - Behavioral and policy interoperability
Based on ISO/IEC 21823-1, this document provides the basic concepts for IoT systems and...Standard
ISO/IEC TR 20547-1:2020 Information technology - Big data reference architecture - Part 1: Framework and application process
Thu, Aug 20 2020Standard
ISO/IEC TR 20547-2:2018 Information technology - Big data reference architecture - Part 2: Use cases and derived requirements
Tue, Jan 30 2018Standard
ISO/IEC TR 20547-5:2018 Information technology - Big data reference architecture - Part 5: Standards roadmap
Thu, Feb 1 2018Standard
ISO/IEC TR 22417:2017Information technology - Internet of things (IoT) - IoT use cases
ISO/IEC TR 22417:2017(E) This technical report identifies IoT scenarios and use cases b... Wed, Nov 1 2017Standard
Standard
ISO/IEC TR 24028:2020 Information technology - Artificial intelligence - Overview of trustworthiness in artificial intelligence
Sat, May 30 2020Standard
ISO/IEC TR 24029-1:2021 Artificial Intelligence (AI) - Assessment of the robustness of neural networks - Part 1: Overview
Tue, Mar 30 2021Standard
ISO/IEC TR 24030 Information technology - Artificial intelligence (AI) - Use cases
Sun, May 30 2021Standard
ISO/IEC TR 27550:2019Information technology -- Security techniques -- Privacy engineering for system life cycle processes
This document provides privacy engineering guidelines that are intended to help organiz... Sun, Sep 1 2019Standard
ISO/IEC TR 30148:2019Internet of things (IoT) - Application of sensor network for wireless gas meters
ISO/IEC TR 30148:2019 describes - the structure of wireless gas meter networks, and - t... Tue, Oct 1 2019Standard
ISO/IEC TR 30164:2020 -Internet of things (IoT) - Edge computing
ISO/IEC TR 30164:2020 describes the common concepts, terminologies, characteristics, us... Wed, Apr 1 2020Standard
ISO/IEC TR 30164:2020 Internet of Things (IoT) - Edge computing
The document describes the common concepts, terminologies, characteristics, use cases a... Wed, Apr 1 2020Standard
ISO/IEC TR 30164:2020Internet of Things (IoT) - Edge computing
ISO/IEC TR 30164:2020 describes the common concepts, terminologies, characteristics, us... Wed, Apr 1 2020Standard
ISO/IEC TR 30172 ED1Digital Twin - Use cases
This document provides a collection of representative use cases of Digital Twin applica...Standard
ISO/IEC TS 27110:2021Information technology, cybersecurity and privacy protection -- Cybersecurity framework development guidelines
This document specifies guidelines for developing a cybersecurity framework. It is appl... Mon, Feb 1 2021Standard
ISO/IEC TS 27570:2021
Privacy protection — Privacy guidelines for smart cities
Standard
ISO/IEC TS 27570:2021Privacy protection -- Privacy guidelines for smart cities
The document takes a multiple agency as well as a citizen-centric viewpoint. It provide... Fri, Jan 1 2021Standard
ISO/IEC/IEEE DIS 24641Systems and Software engineering -- Methods and tools for model-based systems and software engineering
This International Standard, within the context of methods and tools for MBSSE: (1) Pro...Standard
ISO/PAS 19450:2015Automation systems and integration - Object-Process Methodology
ISO/PAS 19450:2015 specifies Object-Process Methodology (OPM) with detail sufficient fo... Tue, Dec 1 2015Standard
ISO/TR 14292:2012, 2.11.Health informatics: Personal health records - Definition, scope and contexts
This Technical Report also considers the wider context of engagement of individuals in ... Fri, Mar 30 2012Standard
ISO/TR 17427-9:2015, 2.5. Intelligent transport systems: Cooperative ITS - Part 9: Compliance and enforcement aspects
ISO/TR 17427-9:2015, 2.5.Intelligent transport systems::Cooperative ITS::Part 9: Compli... Mon, Mar 30 2015Standard
ISO/TR 18307:2001, 3.51. Health informatics: Interoperability and compatibility in messaging and communication standards - Key characteristics
ISO/TR 18307:2001, 3.51. Health informatics::Interoperability and compatibility in mess... Sun, Dec 30 2001Standard
Standard
ISO/TR 19669:2017, 3.11. Health informatics: Re-usable component strategy for use case development
ISO/TR 19669:2017 specifies a use case development methodology, facilitated by a dynami... Mon, Oct 30 2017Standard
Standard
Standard
ISO/TS 13972:2015, 2.31. Health informatics: Detailed clinical models, characteristics and processes
ISO/TS 13972:2015: (a) Describes requirements and recommended methods against which cli... Tue, Oct 20 2015Standard
ISO/TS 14265:2011, 2.9. Health Informatics - Classification of purposes for processing personal health information
ISO/TS 14265:2011, 2.9.Health Informatics - Classification of purposes for processing p... Sat, Nov 26 2011Standard
ISO/TS 17975:2015, 3.1. Health informatics: Principles and data requirements for consent in the collection, use or disclosure of personal health information
ISO/TS 17975:2015, 3.1. Health informatics::Principles and data requirements for consen... Wed, Sep 30 2015Standard
Standard
Standard
Standard
Standard
ISO/TS 19150-1:2012 Geographic information - Ontology - Part 1: Framework
ISO/TS 19150-1:2012 defines the framework for semantic interoperability of geographic i... Thu, Nov 1 2012Standard
Standard
Standard
Standard
Standard
ISO/TS 21089:2018 Health informatics -Trusted end-to-end information flows
ISO/TS 21089:2018 describes trusted end-to-end flow for health information and health d... Fri, Apr 20 2018Standard
ISO/TS 23258:2021 Blockchain and distributed ledger technologies Taxonomy and Ontology
This document specifies a taxonomy and an ontology for blockchain and distributed ledge... Mon, Nov 1 2021Standard
ISO/TS 23258:2021 Blockchain and distributed ledger technologies - Taxonomy and Ontology
This document specifies a taxonomy and an ontology for blockchain and distributed ledge... Thu, Jul 1 2021Standard
IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts
This document defines terms for identity management, and specifies core concepts of ide... Wed, May 1 2019Standard
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
This document defines terms for identity management, and specifies core concepts of ide...Standard
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements
ISO/IEC 24760-2:2015 provides guidelines for the implementation of systems for the mana...Standard
IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication
This international standard provides guidance on implementing user authentication and t...Working group
IT Service Management and IT Governance
Scope Standardization of IT Service Management and IT Governance. Develop standards, to... Wed, Dec 18 2013Working group
ITS Working Group 1: Application Requirements and Services
Working Group 1 shall develop ETSI deliverables on the application requirements and ser... Thu, Jan 10 2019Working group
ITS Working Group 2: Architecture and Cross
Working Group 2 shall develop the overall architecture and address cross (OSI) layer is... Wed, Jul 10 2019Working group
ITS Working Group 3: Transport and Network
Working Group 3 shall develop ETSI deliverables for the data transport and network prot...Working group
ITS Working Group 4: Media and Medium
Working Group 4 shall encompass ITS standardization on OSI model layers 1 and 2 includi...Working group
ITS Working Group 5: Security
Working Group 5 shall be responsible for: Wed, Jul 10 2019Standard
ITU - T - [2017-2020] : [SG17] : [Q8/17] X.sgtBD - Security guidelines of lifecycle management for telecom big data
This Recommendation is security guidelines of lifecycle management for telecom Big Data...Standard
ITU -T - [2017-2020] : [SG17] : [Q8/17] - X.GSBDaaS - Guidelines on security of Big Data as a Service
Big data based on cloud computing provides the capabilities to collect, store, analyze,...Standard
ITU T Y.QKDN_frint "Framework for integration of QKDN and secure network infrastructures" - DRAFT
ITU T Y.QKDN_frint "Framework for integration of QKDN and secure network infrastructure...Standard
ITU-H.644.4 (06/21)Architecture for mobile/multi-access edge computing enabled content delivery networks
Recommendation ITU-T H.644.4 specifies a functional architecture for mobile/multi-acces...
Tue, Jun 1 2021
Working group
ITU-T - SG16 FG-AI4H - Focus Group on “Artificial Intelligence for Health”
The ITU-T Focus Group on Artificial Intelligence for Health (AI4H) was established by I...Standard
ITU-T - SG11 - Q.5001Signalling requirements and architecture of intelligent edge computing
A huge volume of data has been generated from the various smart things. Lots of smart s... Mon, Oct 1 2018Standard
ITU-T - SG11 - Q.5003Signalling requirements and architecture for federated multiaccess edge computing
Recommendation ITU-T Q.5003 describes signalling requirements and architecture for fede... Tue, Feb 1 2022Standard
ITU-T - SG11 - Q.IEC-PROProtocols for microservices based intelligent edge computing
For development of the IEC architecture, there are couple of software-oriented architec...Standard
ITU-T - SG13 - Y. FMSC-MECMulti-access Edge Computing for fixed, mobile and satellite convergence in IMT-2020 networks and beyond
This draft Recommendation aims to describe the framework of Multi-access Edge Computing...Standard
ITU-T - SG13 - Y.3076Architecture of ICN-enabled Edge Network in IMT-2020
This Recommendation specifies the requirements and architecture about ICN-enabled edge ... Tue, Sep 1 2020Standard
ITU-T - SG13 - Y.3526Cloud computing - Functional requirements of edge cloud management
This Recommendation provides requirements for edge cloud. It introduces the overview of... Mon, Nov 1 2021Standard
ITU-T - SG13 - Y.ec-reqtsOverview and requirements of edge computing
This Recommendation provides overview and requirements of edge computing. To provide re...Standard
ITU-T - SG13 - Y.ecloud-reqtsCloud computing - Functional requirements of edge cloud
This Recommendation provides functional requirements of edge cloud. Edge cloud is a clo...Standard
ITU-T - SG13 - Y.FMC -AAEC-reqUse cases and Technical requirements for supporting application addressing in edge computing for future networks including IMT-2020 network
This draft Recommendation presents the use cases and technical requirements of applicat...Standard
ITU-T - SG13 - Y.FMC-AAECApplication addressing in edge computing in IMT-2020 network and beyond
On the basis of Y.FMC-AAEC-req, which specifies use cases and requirement of applicatio...Standard
ITU-T - SG13 - Y.FMC-ECUnified edge computing for supporting fixed mobile convergence in IMT-2020 networks
A unified and cloud-based edge computing platform allows operators to flexibly deploy n...Standard
ITU-T - SG13 - Y.IMT2020-CEFECFramework of capability exposure function in edge computing for IMT-2020 networks and beyond
This draft Recommendation specifies the framework of capability exposure function (CEF)...Standard
ITU-T - SG13 - Y.LSMECLocal shunting for multi-access edge computing in IMT- 2020 networks
The draft Recommendation describes the requirements, architecture, functional entities,...Standard
ITU-T - SG16 - F.743.13Requirements for cooperation of multiple edge gateways
This Recommendation describes the requirements for a function which enables the coopera... Tue, Mar 1 2022Standard
ITU-T - SG16 - F.CECRequirements and reference framework of cloud-edge collaboration in industrial machine vision systems
With the development of industry, cloud computing and edge computing are widely used. E...Standard
ITU-T - SG16 - F.DC-CGS-TRECTechnical requirements of cloud gaming system for 5G mobile edge computing
Cloud gaming requires high real-time performance, so it needs special hardwares to matc...Standard
ITU-T - SG16 - F.DVMSFEdge - Distributed vehicular multimedia services framework for V2X based edge computing
Recommendation ITU-T F.749.3 describes the use-cases and requirements for vehicular mul...Standard
ITU-T - SG16 - H.VSECArchArchitecture for edge computing platform supporting a video surveillance system
Architecture for edge computing platform supporting a video surveillance systemStandard
ITU-T - SG17 - X.5Gsec-ecsSecurity framework for 5G edge computing services
This draft Recommendation analyses the potential deployment scheme and typical applicat...Standard
ITU-T - SG17 - X.5Gsec-netecSecurity capabilities of network layer for 5G edge computing
5G EC would play a key role on low latency services and traffic off-load services in 5G...Standard
ITU-T - SG17 - X.gecdsGuideline on edge computing data security
Edge computing is strongly related to 5G and UPF is the data connection point between t...Standard
ITU-T - SG17 - X.itssec-5Security guidelines for vehicular edge computing
This draft Recommendation provides security guidelines for vehicular edge computing. Ve...Standard
ITU-T - SG17 - X.sa-ecSecurity architecture of edge cloud
The purpose of this Recommendation is to guide operator to implement a uniformed securi...Working group
ITU-T - SG20 - Internet of things (IoT) and smart cities and communities (SC&C)
SG20 develops international standards to enable the coordinated development of IoT tech...Standard
ITU-T - SG20Framework of decentralized service by using DLT and edge computing technologies for IoT devices
Decentralized services (e.g., enabled by distributed ledger technologies, DLT) for IoT ...Standard
ITU-T - SG5 - L.EEMDCEnergy Efficiency in Micro Data Centre for Edge Computing
The scope of the draft Recommendation is as follows. - considerations on micro data cen...Standard
ITU-T - SG5 - L.Spec_Edge DCSpecification of Edge Data Centre infrastructure
In recent years, there a+E139:I139re more extra-large data centres worldwide. Although ...Standard
ITU-T - [2017-2020] : [SG17] : [Q13/17] - X.mdcv : security-related misbehaviour detection mechanism based on big data analysis for connected vehicles
Security-related misbehaviour detection mechanism based on big data analysis for connec...Standard
ITU-T E.475 (ex E.FINAD) - Guidelines for Intelligent Network Analytics and Diagnostics
Mon, Jan 13 2020Standard
ITU-T F.743.10 (11/2019)Requirements for mobile edge computing enabled content delivery networks
Recommendation ITU-T F.743.10 specifies the general framework, scenarios and requiremen... Fri, Nov 1 2019Standard
ITU-T F.743.12 (06/2021)Requirements for edge computing in video surveillance
Recommendation ITU-T F.743.12 defines the requirements for edge computing in video surv... Tue, Jun 1 2021Standard
ITU-T F.746.11 (ex F.IQAS-INT) - Interfaces for intelligent question answering system
Tue, Jun 30 2020Standard
ITU-T F.748.11 (ex F.AI-DLPB) - Metrics and evaluation methods for deep neural network processor benchmark
Tue, Jun 30 2020Standard