Results 81 to 90 of about 95,792 (317)

SSDHT:social network-based secure DHT mechanism

open access: yesDianxin kexue, 2018
P2P systems have been widely used in the field of file sharing,etc.However,DHT (distributed hash table) networks have no center,no authentication,and lack of node authentication mechanism,making existing DHT-based P2P systems vulnerable to external ...
Panpan LI   +5 more
doaj   +2 more sources

Secure and Fault-Tolerant Distributed Location Management for Intelligent 5G Wireless Networks

open access: yesIEEE Access, 2018
Distributed mobility management (DMM) requires a flattened cellular network architecture to meet ever-increasing traffic demands of mobile users. In order to get rid of centralized mobility entities, it is desirable to manage locations of mobile nodes ...
Kashif Munir   +4 more
doaj   +1 more source

Extreme Scale De Novo Metagenome Assembly [PDF]

open access: yes, 2018
Metagenome assembly is the process of transforming a set of short, overlapping, and potentially erroneous DNA segments from environmental samples into the accurate representation of the underlying microbiomes's genomes. State-of-the-art tools require big
Arndt, Bill   +8 more
core   +3 more sources

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing

open access: yesCybernetics and Information Technologies, 2015
Load balancing is treated as one of the important mechanisms for efficient resource allocation in cloud computing. In future there will appear a necessity of fully autonomic distributed systems to address the load balancing issues. With reference to this,
Mallikarjuna B., Venkata Krishna P.
doaj   +1 more source

UPC++: A high-performance communication framework for asynchronous computation [PDF]

open access: yes, 1968
UPC++ is a C++ library that supports high-performance computation via an asynchronous communication framework. This paper describes a new incarnation that differs substantially from its predecessor, and we discuss the reasons for our design decisions. We
Bachan, J   +7 more
core  

Performance Investigation of Eco‐Friendly Refrigerant Mixtures as an Alternative to R134a in Vapour‐Compression Refrigeration System

open access: yesAsia-Pacific Journal of Chemical Engineering, EarlyView.
ABSTRACT The growing impacts of climate change and energy scarcity demand environmentally sustainable refrigeration solutions. This study investigates eco‐friendly refrigerants (R152a, R290 and R600a) and their optimized ternary mixture as alternatives to R134a. Four blend compositions were analysed using experimental testing and REFPROP 10.0 modelling
M. Periyasamy, P. Senthilkumar
wiley   +1 more source

Vertical coordination in agri‐food supply chain and blockchain: A proposed framework solution for Vietnamese cashew nut business

open access: yesRegional Science Policy &Practice, EarlyView., 2022
Abstract The agri‐food supply chain has been a popular research topic in recent years. The combination of a demand for products of high quality and safety standards and the increasing number of stakeholders in supply chain networks has required the agri‐food business to transform from vertically integrated to vertically operated supply chain networks ...
Thanh_Tuan Chu, Thi Thu Tra Pham
wiley   +1 more source

Self-Correcting Broadcast in Distributed Hash Tables [PDF]

open access: yes, 2003
We present two broadcast algorithms that can be used on top of distributed hash tables (DHTs) to perform group communication and arbitrary queries. Unlike other P2P group communication mechanisms, which either embed extra information in the DHTs or use ...
Brand, Per   +4 more
core   +3 more sources

Distributed Random Process for a Large-Scale Peer-to-Peer Lottery [PDF]

open access: yes, 2017
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. This issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of ...
J Zhou   +7 more
core   +3 more sources

Home - About - Disclaimer - Privacy