Phocas: dimensional Byzantine-resilient stochastic gradient descent [PDF]
We propose a novel robust aggregation rule for distributed synchronous Stochastic Gradient Descent~(SGD) under a general Byzantine failure model. The attackers can arbitrarily manipulate the data transferred between the servers and the workers in the parameter server~(PS) architecture. We prove the Byzantine resilience of the proposed aggregation rules.
arxiv
A comprehensive survey on software‐defined networking for smart communities
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary+3 more
wiley +1 more source
Generalized Byzantine-tolerant SGD [PDF]
We propose three new robust aggregation rules for distributed synchronous Stochastic Gradient Descent~(SGD) under a general Byzantine failure model. The attackers can arbitrarily manipulate the data transferred between the servers and the workers in the parameter server~(PS) architecture.
arxiv
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
A novel painted monument. Byzantine Art between Aesthetic Redefining and Dogmatic Perennity. The church Saint John the Baptist of Bârnova [PDF]
Being remarkable through the monumentality and elegance of proportions, the architecture of the Church “Saint John the Baptist” from Bârnova derives from the so-called old Wallachian style, skillfully reshaping a structure which combines elements which ...
Mihail M. Gheaţău
doaj
Genuinely Distributed Byzantine Machine Learning [PDF]
Machine Learning (ML) solutions are nowadays distributed, according to the so-called server/worker architecture. One server holds the model parameters while several workers train the model. Clearly, such architecture is prone to various types of component failures, which can be all encompassed within the spectrum of a Byzantine behavior.
arxiv
Wireless power transfer (WPT) has been developed as a transformative alternative to traditional plug‐in charging for electric vehicles (EVs), offering significant developments in mobile charging. EVs are charged while moving on the roads. This review provides a comprehensive overview of various WPT technologies, including inductive power transfer (IPT),
Gaurav Kumar+3 more
wiley +1 more source
Domes in the central Mediterranean. Geometric syncretism and cultural hybridizations
This paper presents a research on geometric, symbolic and formal hybridizations between the different cultures of the Mediterranean. In particular, it focuses on some religious architecture in this area, the geographical centre of a wide cultural ...
Domenico Mediati+2 more
doaj
Royal canopy over the church entrance: Forms, spatial contexts, iconographic programs, and meaning of the dome in Serbian narthexes of the 14th century [PDF]
The churches commissioned by King (later Emperor) Stephen Dušan, his important dignitaries, and later Serbian rulers-e.g., Holy Archangels near Prizren, Lesnovo, Hilandar, Markov Manastir, Ravanica, and Manasija-often have a narthex or an entrance porch ...
Stanković Nebojša P.
doaj +1 more source
BF‐ACS—Intelligent and Immutable Face Recognition Access Control System
Biometric authentication is adopted in many access control scenarios in recent years. It is very convenient and secure since it compares the user’s own biometrics with those stored in the database to confirm their identification. Since then, with the vigorous development of machine learning, the performance and accuracy of biometric authentication have
Wen-Bin Hsieh, Wanli Wen
wiley +1 more source