Results 1 to 10 of about 6,045,690 (283)

Distributed Computing Concepts in D0

open access: yes, 2003
The D0 experiment faces many challenges enabling access to large datasets for physicists on four continents. The new concepts for distributed large scale computing implemented in D0 aim for an optimal use of the available computing resources while ...
Wicke, Daniel
core   +1 more source

Distributed data mining in grid computing environments [PDF]

open access: yes, 2007
The official published version of this article can be found at the link below.The computing-intensive data mining for inherently Internet-wide distributed data, referred to as Distributed Data Mining (DDM), calls for the support of a powerful Grid with ...
Cannataro   +7 more
core   +1 more source

Systematic Analysis of Low-Precision Training in Deep Neural Networks: Factors Influencing Matrix Computations

open access: yesApplied Sciences
As Deep Neural Networks (DNNs) continue to increase in complexity, the computational demands of their training have become a significant bottleneck. Low-precision training has emerged as a crucial strategy, wherein full-precision values are quantized to ...
Ao Shen, Zhiquan Lai, Lizhi Zhang
doaj   +1 more source

Artificial Intelligence Applications and Self-Learning 6G Networks for Smart Cities Digital Ecosystems: Taxonomy, Challenges, and Future Directions

open access: yesSensors, 2022
The recent upsurge of smart cities’ applications and their building blocks in terms of the Internet of Things (IoT), Artificial Intelligence (AI), federated and distributed learning, big data analytics, blockchain, and edge-cloud computing has urged the ...
Leila Ismail, Rajkumar Buyya
doaj   +1 more source

A Mutiscale Residual Attention Network for Multitask Learning of Human Activity Using Radar Micro-Doppler Signatures

open access: yesRemote Sensing, 2019
Short-range radar has become one of the latest sensor technologies for the Internet of Things (IoT), and it plays an increasingly vital role in IoT applications.
Yuan He, Xinyu Li, Xiaojun Jing
doaj   +1 more source

LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme

open access: yesEntropy
Image security faces increasing challenges with the widespread application of computer science and artificial intelligence. Although chaotic systems are employed to encrypt images and prevent unauthorized access or tampering, the degradation that occurs ...
Mingliang Sun   +4 more
doaj   +1 more source

A Survey of Deep Learning-Based Human Activity Recognition in Radar

open access: yesRemote Sensing, 2019
Radar, as one of the sensors for human activity recognition (HAR), has unique characteristics such as privacy protection and contactless sensing. Radar-based HAR has been applied in many fields such as human–computer interaction, smart surveillance and ...
Xinyu Li, Yuan He, Xiaojun Jing
doaj   +1 more source

Minimizing latency for secure distributed computing [PDF]

open access: yesInternational Symposium on Information Theory, 2017
We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The master wants to distribute these computations
Rawad Bitar   +2 more
semanticscholar   +1 more source

A collaborative citizen science platform for real-time volunteer computing and games

open access: yes, 2017
Volunteer computing (VC) or distributed computing projects are common in the citizen cyberscience (CCS) community and present extensive opportunities for scientists to make use of computing power donated by volunteers to undertake large-scale scientific ...
Charalampidis, Ioannis   +4 more
core   +1 more source

Automated Vulnerability Discovery and Exploitation in the Internet of Things

open access: yesSensors, 2019
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial:
Zhongru Wang   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy