Results 81 to 90 of about 2,379,840 (364)

Distributed Computing with Adaptive Heuristics [PDF]

open access: yes, 2010
We use ideas from distributed computing to study dynamic environments in which computational nodes, or decision makers, follow adaptive heuristics (Hart 2005), i.e., simple and unsophisticated rules of behavior, e.g., repeatedly "best replying" to others'
Jaggard, Aaron D.   +2 more
core  

Ecosystem-Oriented Distributed Evolutionary Computing

open access: yes, 2012
We create a novel optimisation technique inspired by natural ecosystems, where the optimisation works at two levels: a first optimisation, migration of genes which are distributed in a peer-to-peer network, operating continuously in time; this process ...
Briscoe, Gerard, De Wilde, Philippe
core   +1 more source

On Distributed Computation in Noisy Random Planar Networks [PDF]

open access: yesProceedings of IEEE International Symposium on Information Theory, 2007, 2007
We consider distributed computation of functions of distributed data in random planar networks with noisy wireless links. We present a new algorithm for computation of the maximum value which is order optimal in the number of transmissions and computation time.We also adapt the histogram computation algorithm of Ying et al to make the histogram ...
arxiv   +1 more source

Modifications in FLAP's second cytosolic loop influence 5‐LOX interaction, inhibitor binding, and leukotriene formation

open access: yesFEBS Letters, EarlyView.
The enzyme 5‐lipoxygenase (5‐LOX) catalyzes the first step in the biosynthesis of leukotrienes (LTs) involved in inflammatory pathophysiology. After cellular stimulation, 5‐LOX translocates to the nucleus, interacting with the 5‐LOX‐activating protein (FLAP) to form LTA4 from arachidonic acid (AA).
Erik Romp   +5 more
wiley   +1 more source

Infinite Networks, Halting and Local Algorithms

open access: yes, 2014
The immediate past has witnessed an increased amount of interest in local algorithms, i.e., constant time distributed algorithms. In a recent survey of the topic (Suomela, ACM Computing Surveys, 2013), it is argued that local algorithms provide a natural
Kuusisto, Antti
core   +1 more source

A Survey of Deep Learning-Based Human Activity Recognition in Radar

open access: yesRemote Sensing, 2019
Radar, as one of the sensors for human activity recognition (HAR), has unique characteristics such as privacy protection and contactless sensing. Radar-based HAR has been applied in many fields such as human–computer interaction, smart surveillance and ...
Xinyu Li, Yuan He, Xiaojun Jing
doaj   +1 more source

A Look at Basics of Distributed Computing [PDF]

open access: yes2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), 2016
This paper presents concepts and basics of distributed computing which are important (at least from the author's point of view), and should be known and mastered by Master students and engineers. Those include: (a) a characterization of distributed computing (which is too much often confused with parallel computing); (b) the notion of a synchronous ...
openaire   +5 more sources

Brucella NyxA and NyxB dimerization enhances effector function during infection

open access: yesFEBS Letters, EarlyView.
Brucella abortus thrives inside cells thanks to the translocation of effector proteins that fine‐tune cellular functions. NyxA and NyxB are two effectors that destabilize the nucleolar localization of their host target, SENP3. We show that the Nyx proteins directly interact with each other and that their dimerization is essential for their function ...
Lison Cancade‐Veyre   +4 more
wiley   +1 more source

Split Distributed Computing in Wireless Sensor Networks [PDF]

open access: yes, 2015
We designed a novel method intended to improve the performance of distributed computing in wireless sensor networks. Our proposed method is designed to rapidly increase the speed of distributed computing and decrease the number of the messages required ...
Kenyeres, J., Kenyeres, M., Skorpil, V.
core   +2 more sources

LVGG-IE: A Novel Lightweight VGG-Based Image Encryption Scheme

open access: yesEntropy
Image security faces increasing challenges with the widespread application of computer science and artificial intelligence. Although chaotic systems are employed to encrypt images and prevent unauthorized access or tampering, the degradation that occurs ...
Mingliang Sun   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy