Results 11 to 20 of about 22,136 (208)

Thread-Modular Static Analysis for Relaxed Memory Models

open access: yes, 2017
We propose a memory-model-aware static program analysis method for accurately analyzing the behavior of concurrent software running on processors with weak consistency models such as x86-TSO, SPARC-PSO, and SPARC-RMO.
Benjamin Livshits V.   +5 more
core   +1 more source

Lightweight Security for Network Coding

open access: yes, 2008
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows.
Barros, Joao   +2 more
core   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Identifying malicious nodes in network-coding-based peer-to-peer streaming networks [PDF]

open access: yes, 2009
published or submitted for ...
Khurana, Himanshu   +3 more
core  

Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]

open access: yes, 2008
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David   +3 more
core   +1 more source

Loss‐Based Ensemble Generative Adversarial Network Model for Enhancing the Sperm Morphology Classification

open access: yesAdvanced Intelligent Systems, EarlyView.
A loss‐based ensemble generative adversarial network (GAN) framework is proposed to address mode collapse in sperm morphology classification. By integrating spatial augmentation and multiple GAN models, the study enhances synthetic data quality. The Shifted Window Transformer achieves 95.37% accuracy on the HuSHeM dataset, outperforming previous ...
Berke Cansiz   +2 more
wiley   +1 more source

SDNsec: Forwarding Accountability for the SDN Data Plane

open access: yes, 2016
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten   +4 more
core   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Synthetic Electrocardiogram Spectrogram Generation Using Generative Adversarial Network‐Based Models: A Comparative Study

open access: yesAdvanced Intelligent Systems, EarlyView.
Cardiovascular diseases are leading death causes; electrocardiogram (ECG) analysis is slow, motivating machine learning and deep learning. This study compares deep convolutional generative adversarial network, conditional GAN, and Wasserstein GAN with gradient penalty (WGAN‐GP) for synthetic ECG spectrograms; Fréchet Inception Distance (FID) and ...
Giovanny Barbosa‐Casanova   +3 more
wiley   +1 more source

The security of NTP's datagram protocol [PDF]

open access: yes, 2017
For decades, the Network Time Protocol (NTP) has been used to synchronize computer clocks over untrusted network paths. This work takes a new look at the security of NTP’s datagram protocol.
Gardner, Jonathan   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy