Results 11 to 20 of about 1,839,877 (306)

Justifying Additive Noise Model-Based Causal Discovery via Algorithmic Information Theory [PDF]

open access: yesOpen systems & information dynamics, 2009
A recent method for causal discovery is in many cases able to infer whether X causes Y or Y causes X for just two observed variables X and Y. It is based on the observation that there exist (non-Gaussian) joint distributions P(X,Y) for which Y may be ...
D. Janzing, Bastian Steudel
semanticscholar   +5 more sources

Contextual information retrieval based on algorithmic information theory and statistical outlier detection [PDF]

open access: yes2008 IEEE Information Theory Workshop, 2007
This work presents an Information Retrieval technique based on algorithmic information theory (using the normalized compression distance), statistical data outlier detection, and a novel database structure.
Rafael Martínez   +3 more
semanticscholar   +3 more sources

Two Philosophical Applications of Algorithmic Information Theory [PDF]

open access: yesInternational Conference on Discrete Mathematics and Theoretical Computer Science, 2003
Written for DMTCS'03, Dijon, July 2003, 12 ...
G. Chaitin
openaire   +3 more sources

Private Blockchain Envisioned Access Control System for Securing Industrial IoT-Based Pervasive Edge Computing

open access: yesIEEE Access, 2023
The Industrial Internet of Things (IIoT) is able to connect machines, analytics and people with IoT smart devices, gateway nodes and edge devices to create powerful intuitivenesses to drive smarter, faster and effective business agreements.
Sourav Saha   +5 more
doaj   +1 more source

Efficient Personal-Health-Records Sharing in Internet of Medical Things Using Searchable Symmetric Encryption, Blockchain, and IPFS

open access: yesIEEE Open Journal of the Communications Society, 2023
Secure storage and sharing of Personal Health Records (PHRs) in Internet of Medical Things (IoMT) is one of the significant challenges in the healthcare ecosystem.
Abhishek Bisht   +3 more
doaj   +1 more source

On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure

open access: yesIEEE Access, 2021
In recent years, the Internet of things (IoT) has become an encouraging communication paradigm that has numerous applications including smart city, smart home and intelligent transportation system.
Ashok Kumar Das   +4 more
doaj   +1 more source

Bilinear pairing-based access control and key agreement scheme for smart transportation

open access: yesCyber Security and Applications, 2023
Internet of Vehicles (IoV) enabled Intelligent Transportation System (ITS) allows smart vehicles to communicate with other vehicles on road, humans (customers or pedestrians), infrastructure (parking areas, traffic lights etc), Internet, Cloud etc.
Palak Bagga   +2 more
doaj   +1 more source

Law without law: from observer states to physics via algorithmic information theory [PDF]

open access: yesQuantum, 2017
According to our current conception of physics, any valid physical theory is supposed to describe the objective evolution of a unique external world. However, this condition is challenged by quantum theory, which suggests that physical systems should not
Markus P. Mueller
semanticscholar   +1 more source

iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment

open access: yesIEEE Access, 2021
Due to wide-spread use of the Information and Communications Technology (ICT) and Internet of Things (IoT) enabled smart devices, called unmanned aerial vehicles (UAVs) (popularly known as drones), a lot of potential applications of Internet of Drones ...
Ashok Kumar Das   +4 more
doaj   +1 more source

Comments on “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”

open access: yesIEEE Access, 2021
Smart home is intended to be able to enhance home automation systems and achieves goals such as reducing operational costs and increasing comfort while providing security to mobile users.
Sungjin Yu   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy