Results 51 to 60 of about 6,115,000 (375)

Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks

open access: yesApplied Sciences, 2023
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology.
Kaijun Liu   +3 more
doaj   +1 more source

Distributed quantum computing: A distributed Shor algorithm

open access: yes, 2004
We present a distributed implementation of Shor's quantum factoring algorithm on a distributed quantum network model. This model provides a means for small capacity quantum computers to work together in such a way as to simulate a large capacity quantum ...
Lomonaco Jr, Samuel J.   +1 more
core   +3 more sources

Short-Term Load Forecasting Based on the Transformer Model

open access: yesInformation, 2021
From the perspective of energy providers, accurate short-term load forecasting plays a significant role in the energy generation plan, efficient energy distribution process and electricity price strategy optimisation.
Zezheng Zhao   +6 more
doaj   +1 more source

Distributed Computing Concepts in D0

open access: yes, 2003
The D0 experiment faces many challenges enabling access to large datasets for physicists on four continents. The new concepts for distributed large scale computing implemented in D0 aim for an optimal use of the available computing resources while ...
Wicke, Daniel
core   +1 more source

Simulating Distributed Systems [PDF]

open access: yes, 2001
The simulation framework developed within the "Models of Networked Analysis at Regional Centers" (MONARC) project as a design and optimization tool for large scale distributed systems is presented.
Legrand, Iosif C., Newman, Harvey B.
core   +1 more source

Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks

open access: yesIEEE Access, 2017
In mobile ad hoc networks (MANETs), if mobile devices frequently leave or join the overlay of MANETs, the communication links between mobile devices or between mobile devices and cloud will lose or reestablish; for searching and routing the needed cloud ...
Jirui Li   +4 more
doaj   +1 more source

Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems

open access: yesInformation, 2020
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of ...
Limengwei Liu   +3 more
doaj   +1 more source

Coded convolution for parallel and distributed computing within a deadline [PDF]

open access: yesInternational Symposium on Information Theory, 2017
We consider the problem of computing the convolution of two long vectors using parallel processors in the presence of “stragglers”. Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical ...
Sanghamitra Dutta, V. Cadambe, P. Grover
semanticscholar   +1 more source

Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

open access: yesIEEE Access, 2019
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted.
Bo Lu   +3 more
doaj   +1 more source

TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions

open access: yesCybersecurity
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy