Results 71 to 80 of about 311,640 (277)

Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache

open access: yesIEEE Access, 2019
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto   +5 more
doaj   +1 more source

An Embedded Level-Shifting Dual-Rail SRAM for High-Speed and Low-Power Cache

open access: yesIEEE Access, 2020
An embedded level-shifting (ELS) dual-rail SRAM is proposed to enhance the availability of dual-rail SRAMs. Although dual-rail SRAM is a powerful solution for satisfying the increasing demand for low-power applications, the enormous performance ...
Tae Hyun Kim   +5 more
doaj   +1 more source

Consumer Mobile Phone Recycling Behaviour: A Systematic Review and Future Research Agenda

open access: yesJournal of Consumer Behaviour, EarlyView.
ABSTRACT Mobile phone recycling has received increasing attention from scholars and practitioners due to its environmental, social, and economic impacts. However, knowledge about consumer mobile phone (MP) recycling behaviour is fragmented, making it challenging to develop effective strategies to promote this behaviour. This study follows the Preferred
Xinru (Angie) Jiang   +4 more
wiley   +1 more source

Design and implementation of geographic information system with mobile terminal and 5G network

open access: yesIET Networks, EarlyView., 2022
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley   +1 more source

Survey of cache technology for VoiceXML-based voice platform

open access: yesTongxin xuebao, 2007
The basic elements and perfect attributes of cache system in VoiceXML-based voice platform were presented,and the difference between WWW environment and VoiceXML-based voice platform was introduced.The cache content selection,cache replacement algorithm ...
WANG Wen-lin   +2 more
doaj  

Research on CCN cache algorithm under software definition

open access: yesJournal of Hebei University of Science and Technology, 2018
In order to solve the problems of caching in the content center network (CCN), based on the fusion architecture of content center network and software defined network (SDN), a method of CCN caching decision under the software definition is proposed ...
Leyuan REN, Junfang WANG, Xuemin ZHANG
doaj   +1 more source

Hidden Markov graphical models with state‐dependent generalized hyperbolic distributions

open access: yesCanadian Journal of Statistics, EarlyView.
Abstract In this article, we develop a novel hidden Markov graphical model to investigate time‐varying interconnectedness between different financial markets. To identify conditional correlation structures under varying market conditions and accommodate shape features embedded in financial time series, we rely upon the generalized hyperbolic family of ...
Beatrice Foroni   +2 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Exploiting Transmission and Caching Diversity in Cache-Enabled User-Centric Network: Analysis and Optimization

open access: yesIEEE Access, 2019
User-centric network (UCN) organizes a dynamic base station group (BSG) for each user equipment (UE), consisting of potential base stations (BSs) with caching ability.
Ying Chen, Hongtao Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy