Results 21 to 30 of about 324,109 (282)

Self-Competence Learning for Bandwidth Slicing and Confidential Computing Requirement

open access: yesIEEE Access, 2021
This work proposes a Self-Competence Learning bandwidth slicing method (SCL) to determine the quantity and position of each slice’s spectrum resources considering the channel diversity and varying bandwidth requirements.
Yen-Hung Chen
doaj   +1 more source

Fog Fragment Cooperation on Bandwidth Management Based on Reinforcement Learning

open access: yesSensors, 2020
The term big data has emerged in network concepts since the Internet of Things (IoT) made data generation faster through various smart environments. In contrast, bandwidth improvement has been slower; therefore, it has become a bottleneck, creating the ...
Motahareh Mobasheri   +2 more
doaj   +1 more source

QoS-Aware Cost Minimization Strategy for AMI Applications in Smart Grid Using Cloud Computing

open access: yesSensors, 2022
Cloud computing coupled with Internet of Things technology provides a wide range of cloud services such as memory, storage, computational processing, network bandwidth, and database application to the end users on demand over the Internet.
Asfandyar Khan   +6 more
doaj   +1 more source

Single-Board-Computer Clusters for Cloudlet Computing in Internet of Things [PDF]

open access: yes, 2019
The number of connected sensors and devices is expected to increase to billions in the near future. However, centralised cloud-computing data centres present various challenges to meet the requirements inherent to Internet of Things (IoT) workloads ...
Fernández Cerero, Damián   +4 more
core   +1 more source

Fairness and energy co-aware computation offloading for fog-assisted IoT

open access: yes工程科学学报, 2022
As an extension of the cloud computing paradigm, fog computing has attracted wide attention due to its advantages of low energy consumption, short time delay, and high bandwidth saving.
Si-guang CHEN, Zi-hui YOU
doaj   +1 more source

A Distributed Algorithm for Fast Mining Frequent Patterns in Limited and Varying Network Bandwidth Environments

open access: yesApplied Sciences, 2019
Data mining is a set of methods used to mine hidden information from data. It mainly includes frequent pattern mining, sequential pattern mining, classification, and clustering.
Chun-Cheng Lin   +5 more
doaj   +1 more source

On the viability of a CSO architecture for on-demand virtualized cloud planning and provisioning [PDF]

open access: yes, 2012
As bandwidth requirements and computing capacity for future applications have been predicted to exceed current network and IT infrastructure capabilities, providers face the need to adapt their provisioning models.
Anhalt, Fabienne   +5 more
core   +1 more source

An Adaptive Framework for Improving Quality of Service in Industrial Systems

open access: yesIEEE Access, 2015
Limited memory bandwidth is considered as the major bottleneck in multimedia cloud computing for more and more virtual machines (VMs) of multimedia processing requiring high memory bandwidth simultaneously.
Gangyong Jia   +4 more
doaj   +1 more source

A Dual-Agent Approach for Coordinated Task Offloading and Resource Allocation in MEC

open access: yesJournal of Electrical and Computer Engineering, 2023
Multiaccess edge computing (MEC) is a novel distributed computing paradigm. In this paper, we investigate the challenges of task offloading scheduling, communication bandwidth, and edge server computing resource allocation for multiple user equipments ...
Jiadong Dong   +5 more
doaj   +1 more source

Quantum optical signal processing in diamond

open access: yes, 2015
Controlling the properties of single photons is essential for a wide array of emerging optical quantum technologies spanning quantum sensing, quantum computing, and quantum communications. Essential components for these technologies include single photon
Bustard, Philip J.   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy