Results 251 to 260 of about 167,829 (332)
Synchronizing LLM-based semantic knowledge bases via secure federated fine-tuning in semantic communication. [PDF]
Li L +6 more
europepmc +1 more source
WarpSpeed: A High-Performance Library for Concurrent GPU Hash Tables [PDF]
Hunter McCoy, Prashant Pandey
openalex +1 more source
To enhance multi‐energy load forecasting accuracy crucial for Integrated Energy System (IES) planning and control, this study proposes the EI2 (Efficient Information Extracting Informer) model. This transformer‐based approach features a shared encoder, incorporates high‐dimensional MLP layers in encoder/decoder feed‐forward networks for deeper pattern ...
Tianlu Gao +7 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai +6 more
wiley +1 more source
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source
ShockHash: Near Optimal-Space Minimal Perfect Hashing Beyond Brute-Force. [PDF]
Lehmann HP, Sanders P, Walzer S.
europepmc +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
Security Authentication Scheme for Vehicle-to-Everything Computing Task Offloading Environments. [PDF]
Liu Y, Li C, Sun Q, Jiang H.
europepmc +1 more source
Forensic analysis and evaluation of file‐wiping applications in Android OS
Abstract Anti‐forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File‐wiping is one of the anti‐forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators.
Dong Bin Oh +6 more
wiley +1 more source

