Detecting Arbitrary Attacks Using Continuous Secured Side Information in Wireless Networks
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding altered symbols to the destination.
Ruohan Cao
doaj +1 more source
Video Analytics in Elite Soccer: A Distributed Computing Perspective. [PDF]
Jha D +6 more
europepmc +1 more source
Computing for Perturbative QCD - A Snowmass White Paper
We present a study on high-performance computing and large-scale distributed computing for perturbative QCD calculations.Comment: 21 pages, 5 ...
, +29 more
core +1 more source
Retracted: Research and Implementation of Distributed Computing Management System for College Students' Sports Health Based on Integrated Regional Collaborative Medical Care. [PDF]
International OT.
europepmc +1 more source
Programming languages for distributed computing systems [PDF]
Henri E. Bal +2 more
openalex +1 more source
Deep distributed computing to reconstruct extremely large lineage trees. [PDF]
Konno N +11 more
europepmc +1 more source
Las Vegas is better than determinism in VLSI and distributed computing (Extended Abstract) [PDF]
Kurt Mehlhorn, Erik M. Schmidt
openalex +1 more source
PanDA for ATLAS distributed computing in the next decade
The Production and Distributed Analysis (PanDA) system has been developed to meet ATLAS production and analysis requirements for a data-driven workload management system capable of operating at the Large Hadron Collider (LHC) data processing scale ...
F. B. Megino +8 more
semanticscholar +1 more source
A Semantic Data-Based Distributed Computing Framework to Accelerate Digital Twin Services for Large-Scale Disasters. [PDF]
Kwon JW, Yun SJ, Kim WT.
europepmc +1 more source
Language constructs and support systems for distributed computing [PDF]
Carla Ellis +2 more
openalex +1 more source

