Results 71 to 80 of about 5,423,023 (263)

Artificial Intelligence Applications and Self-Learning 6G Networks for Smart Cities Digital Ecosystems: Taxonomy, Challenges, and Future Directions

open access: yesSensors, 2022
The recent upsurge of smart cities’ applications and their building blocks in terms of the Internet of Things (IoT), Artificial Intelligence (AI), federated and distributed learning, big data analytics, blockchain, and edge-cloud computing has urged the ...
Leila Ismail, Rajkumar Buyya
doaj   +1 more source

SoK: Distributed Computing in ICN [PDF]

open access: yesarXiv, 2023
Information-Centric Networking (ICN), with its data-oriented operation and generally more powerful forwarding layer, provides an attractive platform for distributed computing. This paper provides a systematic overview and categorization of different distributed computing approaches in ICN encompassing fundamental design principles, frameworks and ...
arxiv  

Distributed computing in practice: the Condor experience

open access: yesConcurrency Practice and Experience, 2005
Since 1984, the Condor project has enabled ordinary users to do extraordinary computing. Today, the project continues to explore the social and technical problems of cooperative computing on scales ranging from the desktop to the world‐wide computational
D. Thain, T. Tannenbaum, M. Livny
semanticscholar   +1 more source

Distributed Computing at the SSCL [PDF]

open access: yes, 1994
The rapid increase in the availability of high performance, cost-effective RISC/UNIX workstations has been both a blessing and a curse. The blessing of having extremely powerful computing engines available on the desk top is well-known to many users. The user has tremendous freedom, flexibility, and control of his environment. That freedom can, however,
Cormell, L., White, R.
openaire   +2 more sources

Minimizing latency for secure distributed computing [PDF]

open access: yesInternational Symposium on Information Theory, 2017
We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The master wants to distribute these computations
Rawad Bitar   +2 more
semanticscholar   +1 more source

Systematic Analysis of Low-Precision Training in Deep Neural Networks: Factors Influencing Matrix Computations

open access: yesApplied Sciences
As Deep Neural Networks (DNNs) continue to increase in complexity, the computational demands of their training have become a significant bottleneck. Low-precision training has emerged as a crucial strategy, wherein full-precision values are quantized to ...
Ao Shen, Zhiquan Lai, Lizhi Zhang
doaj   +1 more source

On Distributed Computation in Noisy Random Planar Networks [PDF]

open access: yesProceedings of IEEE International Symposium on Information Theory, 2007, 2007
We consider distributed computation of functions of distributed data in random planar networks with noisy wireless links. We present a new algorithm for computation of the maximum value which is order optimal in the number of transmissions and computation time.We also adapt the histogram computation algorithm of Ying et al to make the histogram ...
arxiv   +1 more source

A Look at Basics of Distributed Computing [PDF]

open access: yes2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 2016
This paper presents concepts and basics of distributed computing which are important (at least from the author's point of view), and should be known and mastered by Master students and engineers. Those include: (a) a characterization of distributed computing (which is too much often confused with parallel computing); (b) the notion of a synchronous ...
openaire   +5 more sources

LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme

open access: yesEntropy
Image security faces increasing challenges with the widespread application of computer science and artificial intelligence. Although chaotic systems are employed to encrypt images and prevent unauthorized access or tampering, the degradation that occurs ...
Mingliang Sun   +4 more
doaj   +1 more source

A Survey of Deep Learning-Based Human Activity Recognition in Radar

open access: yesRemote Sensing, 2019
Radar, as one of the sensors for human activity recognition (HAR), has unique characteristics such as privacy protection and contactless sensing. Radar-based HAR has been applied in many fields such as human–computer interaction, smart surveillance and ...
Xinyu Li, Yuan He, Xiaojun Jing
doaj   +1 more source

Home - About - Disclaimer - Privacy