Results 51 to 60 of about 4,614,854 (360)
Intelligent Distributed Computing [PDF]
The Special Issue of Concurrency and Computation: Practice and Experience journal presents papers presented at the International Symposium on Intelligent Distributed Computing (IDC) held in 2014 in Madrid. Alexander Pokahr and and Lars Braubach focus on the effective utilization of theoretically unlimited distributed and virtual resources, which are ...
VENTICINQUE, Salvatore, Camacho, David
openaire +3 more sources
Coded convolution for parallel and distributed computing within a deadline [PDF]
We consider the problem of computing the convolution of two long vectors using parallel processors in the presence of “stragglers”. Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical ...
Sanghamitra Dutta, V. Cadambe, P. Grover
semanticscholar +1 more source
In existing studies, the problem of maximizing aggregation information based on a given particular tree in deadlineand energy-constrained unreliable wireless sensor networks was addressed.
Yunquan Gao+3 more
doaj +1 more source
Efficiently Approximating Top-
In real-world networks, an edge (or vertex) may be associated with a transaction database, where each transaction consists of a set of items to describe the attributes or behaviors of the edge (or vertex).
Mingtao Lei+3 more
doaj +1 more source
Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios.
Daoqi Han, Xiaofeng Du, Yueming Lu
doaj +1 more source
How to optimally allocate resources for coded distributed computing? [PDF]
To execute cloud computing tasks over a data center hosting hundreds of thousands of server nodes, it is natural to distribute computations across the nodes to take advantage of parallel processing.
Qian Yu+3 more
semanticscholar +1 more source
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan+4 more
doaj +1 more source
Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted.
Bo Lu+3 more
doaj +1 more source
Short-Term Load Forecasting Based on the Transformer Model
From the perspective of energy providers, accurate short-term load forecasting plays a significant role in the energy generation plan, efficient energy distribution process and electricity price strategy optimisation.
Zezheng Zhao+6 more
doaj +1 more source
The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley +1 more source