Results 51 to 60 of about 1,601,615 (185)

A Survey of Deep Learning-Based Human Activity Recognition in Radar

open access: yesRemote Sensing, 2019
Radar, as one of the sensors for human activity recognition (HAR), has unique characteristics such as privacy protection and contactless sensing. Radar-based HAR has been applied in many fields such as human–computer interaction, smart surveillance and ...
Xinyu Li, Yuan He, Xiaojun Jing
doaj   +1 more source

BaBar simulation production - A millennium of work in under a year [PDF]

open access: yes, 2006
The BaBar experiment requires simulated events beyond the ability of a single computing site to provide. This paper describes the evolution of simulation and job management methods to meet the physics community requirements and how production became ...
Blanc, F, Bozzi, C, Khan, A, Smith, D A
core   +1 more source

LogLAA: an adaptive integrated log anomaly analysis framework

open access: yesCybersecurity
Modern systems generate massive amounts of logs during operation, which are the key foundation for anomaly log analysis. However, existing research typically breaks down log analysis into multiple isolated tasks, which lacks flexibility in complex ...
Yali Gao   +4 more
doaj   +1 more source

LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme

open access: yesEntropy
Image security faces increasing challenges with the widespread application of computer science and artificial intelligence. Although chaotic systems are employed to encrypt images and prevent unauthorized access or tampering, the degradation that occurs ...
Mingliang Sun   +4 more
doaj   +1 more source

How to Optimally Allocate Resources for Coded Distributed Computing?

open access: yes, 2017
Today's data centers have an abundance of computing resources, hosting server clusters consisting of as many as tens or hundreds of thousands of machines.
Avestimehr, A. Salman   +3 more
core   +1 more source

Distributed BLAST in a grid computing context [PDF]

open access: yes, 2005
The Basic Local Alignment Search Tool (BLAST) is one of the best known sequence comparison programs available in bioinformatics. It is used to compare query sequences to a set of target sequences, with the intention of finding similar sequences in the ...
D.R. Mathog   +4 more
core   +2 more sources

Automated Vulnerability Discovery and Exploitation in the Internet of Things

open access: yesSensors, 2019
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial:
Zhongru Wang   +9 more
doaj   +1 more source

Leveraging the Grid to Provide a Global Platform for Ubiquitous Computing Research [PDF]

open access: yes, 2003
The requirement for distributed systems support for Ubicomp has led to the development of numerous platforms, each addressing a subset of the overall requirements of ubiquitous systems.
Boddupalli, Prasad   +3 more
core  

Adap-UIL: A Multi-Feature-Aware User Identity Linkage Framework Based on an Adaptive Graph Walk

open access: yesApplied Sciences
User Identity Linkage (UIL) has emerged as a focal point of research in the field of network analysis and plays a critical role in the governance of cyberspace; related technologies can also be extended for applications in traffic safety and traffic ...
Xiaqing Xie   +3 more
doaj   +1 more source

Stock Market Prediction via Multi-Source Multiple Instance Learning

open access: yesIEEE Access, 2018
Forecasting the stock market movements is an important and challenging task. As the Web information grows, researchers begin to extract effective indicators (e.g., the events and sentiments) from the Web to facilitate the prediction.
Xi Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy