Results 71 to 80 of about 6,045,690 (283)
Coded convolution for parallel and distributed computing within a deadline [PDF]
We consider the problem of computing the convolution of two long vectors using parallel processors in the presence of “stragglers”. Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical ...
Sanghamitra Dutta, V. Cadambe, P. Grover
semanticscholar +1 more source
Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of ...
Limengwei Liu +3 more
doaj +1 more source
Infinite Networks, Halting and Local Algorithms
The immediate past has witnessed an increased amount of interest in local algorithms, i.e., constant time distributed algorithms. In a recent survey of the topic (Suomela, ACM Computing Surveys, 2013), it is argued that local algorithms provide a natural
Kuusisto, Antti
core +1 more source
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan +4 more
doaj +1 more source
Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted.
Bo Lu +3 more
doaj +1 more source
Ecosystem-Oriented Distributed Evolutionary Computing
We create a novel optimisation technique inspired by natural ecosystems, where the optimisation works at two levels: a first optimisation, migration of genes which are distributed in a peer-to-peer network, operating continuously in time; this process ...
Briscoe, Gerard, De Wilde, Philippe
core +1 more source
Efficiently Approximating Top-
In real-world networks, an edge (or vertex) may be associated with a transaction database, where each transaction consists of a set of items to describe the attributes or behaviors of the edge (or vertex).
Mingtao Lei +3 more
doaj +1 more source
A Deep-Learning Method for Radar Micro-Doppler Spectrogram Restoration
Radio frequency interference, which makes it difficult to produce high-quality radar spectrograms, is a major issue for micro-Doppler-based human activity recognition (HAR). In this paper, we propose a deep-learning-based method to detect and cut out the
Yuan He +4 more
doaj +1 more source
Split Distributed Computing in Wireless Sensor Networks [PDF]
We designed a novel method intended to improve the performance of distributed computing in wireless sensor networks. Our proposed method is designed to rapidly increase the speed of distributed computing and decrease the number of the messages required ...
Kenyeres, J., Kenyeres, M., Skorpil, V.
core +2 more sources
Social media have become increasingly popular for the sharing and spreading of user-generated content due to their easy access, fast dissemination, and low cost.
Yali Gao +4 more
doaj +1 more source

