Results 1 to 10 of about 1,594,729 (184)
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology.
Kaijun Liu +3 more
doaj +1 more source
Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios.
Daoqi Han, Xiaofeng Du, Yueming Lu
doaj +1 more source
Short-Term Load Forecasting Based on the Transformer Model
From the perspective of energy providers, accurate short-term load forecasting plays a significant role in the energy generation plan, efficient energy distribution process and electricity price strategy optimisation.
Zezheng Zhao +6 more
doaj +1 more source
Tessellated Distributed Computing
The work considers the $N$-server distributed computing scenario with $K$ users requesting functions that are linearly-decomposable over an arbitrary basis of $L$ real (potentially non-linear) subfunctions. In our problem, the aim is for each user to receive their function outputs, allowing for reduced reconstruction error (distortion) $ε$, reduced ...
Ali Khalesi, Petros Elia
openaire +2 more sources
AbstractDistributed computing has been playing a significant role in current smart applications in various fields. In this chapter, we first briefly give a bird’s-eye view of this topic, introducing various programming paradigms. Next, we introduce Actor, an OCaml-based distributed computing engine, and how it works together with Owl.
Liang Wang, Jianxin Zhao
openaire +1 more source
Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), if mobile devices frequently leave or join the overlay of MANETs, the communication links between mobile devices or between mobile devices and cloud will lose or reestablish; for searching and routing the needed cloud ...
Jirui Li +4 more
doaj +1 more source
Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of ...
Limengwei Liu +3 more
doaj +1 more source
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan +4 more
doaj +1 more source
Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted.
Bo Lu +3 more
doaj +1 more source
Efficiently Approximating Top-
In real-world networks, an edge (or vertex) may be associated with a transaction database, where each transaction consists of a set of items to describe the attributes or behaviors of the edge (or vertex).
Mingtao Lei +3 more
doaj +1 more source

