Results 51 to 60 of about 6,115,000 (375)
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology.
Kaijun Liu +3 more
doaj +1 more source
Distributed quantum computing: A distributed Shor algorithm
We present a distributed implementation of Shor's quantum factoring algorithm on a distributed quantum network model. This model provides a means for small capacity quantum computers to work together in such a way as to simulate a large capacity quantum ...
Lomonaco Jr, Samuel J. +1 more
core +3 more sources
Short-Term Load Forecasting Based on the Transformer Model
From the perspective of energy providers, accurate short-term load forecasting plays a significant role in the energy generation plan, efficient energy distribution process and electricity price strategy optimisation.
Zezheng Zhao +6 more
doaj +1 more source
Distributed Computing Concepts in D0
The D0 experiment faces many challenges enabling access to large datasets for physicists on four continents. The new concepts for distributed large scale computing implemented in D0 aim for an optimal use of the available computing resources while ...
Wicke, Daniel
core +1 more source
Simulating Distributed Systems [PDF]
The simulation framework developed within the "Models of Networked Analysis at Regional Centers" (MONARC) project as a design and optimization tool for large scale distributed systems is presented.
Legrand, Iosif C., Newman, Harvey B.
core +1 more source
Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), if mobile devices frequently leave or join the overlay of MANETs, the communication links between mobile devices or between mobile devices and cloud will lose or reestablish; for searching and routing the needed cloud ...
Jirui Li +4 more
doaj +1 more source
Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of ...
Limengwei Liu +3 more
doaj +1 more source
Coded convolution for parallel and distributed computing within a deadline [PDF]
We consider the problem of computing the convolution of two long vectors using parallel processors in the presence of “stragglers”. Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical ...
Sanghamitra Dutta, V. Cadambe, P. Grover
semanticscholar +1 more source
Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted.
Bo Lu +3 more
doaj +1 more source
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan +4 more
doaj +1 more source

