Results 71 to 80 of about 6,045,690 (283)

Coded convolution for parallel and distributed computing within a deadline [PDF]

open access: yesInternational Symposium on Information Theory, 2017
We consider the problem of computing the convolution of two long vectors using parallel processors in the presence of “stragglers”. Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical ...
Sanghamitra Dutta, V. Cadambe, P. Grover
semanticscholar   +1 more source

Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems

open access: yesInformation, 2020
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of ...
Limengwei Liu   +3 more
doaj   +1 more source

Infinite Networks, Halting and Local Algorithms

open access: yes, 2014
The immediate past has witnessed an increased amount of interest in local algorithms, i.e., constant time distributed algorithms. In a recent survey of the topic (Suomela, ACM Computing Surveys, 2013), it is argued that local algorithms provide a natural
Kuusisto, Antti
core   +1 more source

TVRAVNF: an efficient low-cost TEE-based virtual remote attestation scheme for virtual network functions

open access: yesCybersecurity
With the continuous advancement of virtualization technology and the widespread adoption of 5G networks, the application of the Network Function Virtualization (NFV) architecture has become increasingly popular and prevalent.
Jie Yuan   +4 more
doaj   +1 more source

Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices

open access: yesIEEE Access, 2019
For wearable devices, this paper proposes an authentication protocol eWMDP. We formally model and analyze it. In the execution model of the protocol, a Dolev-Yao adversary is constituted.
Bo Lu   +3 more
doaj   +1 more source

Ecosystem-Oriented Distributed Evolutionary Computing

open access: yes, 2012
We create a novel optimisation technique inspired by natural ecosystems, where the optimisation works at two levels: a first optimisation, migration of genes which are distributed in a peer-to-peer network, operating continuously in time; this process ...
Briscoe, Gerard, De Wilde, Philippe
core   +1 more source

Efficiently Approximating Top- $k$ Sequential Patterns in Transactional Graphs

open access: yesIEEE Access, 2019
In real-world networks, an edge (or vertex) may be associated with a transaction database, where each transaction consists of a set of items to describe the attributes or behaviors of the edge (or vertex).
Mingtao Lei   +3 more
doaj   +1 more source

A Deep-Learning Method for Radar Micro-Doppler Spectrogram Restoration

open access: yesSensors, 2020
Radio frequency interference, which makes it difficult to produce high-quality radar spectrograms, is a major issue for micro-Doppler-based human activity recognition (HAR). In this paper, we propose a deep-learning-based method to detect and cut out the
Yuan He   +4 more
doaj   +1 more source

Split Distributed Computing in Wireless Sensor Networks [PDF]

open access: yes, 2015
We designed a novel method intended to improve the performance of distributed computing in wireless sensor networks. Our proposed method is designed to rapidly increase the speed of distributed computing and decrease the number of the messages required ...
Kenyeres, J., Kenyeres, M., Skorpil, V.
core   +2 more sources

Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources

open access: yesIEEE Access, 2019
Social media have become increasingly popular for the sharing and spreading of user-generated content due to their easy access, fast dissemination, and low cost.
Yali Gao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy