Results 81 to 90 of about 23,863 (307)
An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla +3 more
wiley +1 more source
Hash in a Flash: Hash Tables for Solid State Devices [PDF]
Tyler Clemons +4 more
openalex +1 more source
RACED: Routing in Payment Channel Networks Using Distributed Hash Tables [PDF]
Kartick Kolachala +2 more
openalex +1 more source
Converting Binary Floating‐Point Numbers to Shortest Decimal Strings: An Experimental Review
ABSTRACT Background When sharing or logging numerical data, we must convert binary floating‐point numbers into their decimal string representations. For example, the number π might become 3.1415927. Engineers have perfected many algorithms for producing such accurate, short strings.
Jaël Champagne Gareau, Daniel Lemire
wiley +1 more source
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most existing data integrity auditing schemes only support the static data and may be unsuitable for
Chenbin Zhao +4 more
doaj +1 more source
ABSTRACT Structural Complexity is perceived as driving cost in system development, yet managing it effectively requires empirical understanding. This study investigates human decision‐making using a toy transportation‐style network design task, focusing on how Structural Complexity, Effort, and Performance interact. Seventy‐four participants (primarily
Alfonso Lanza +3 more
wiley +1 more source
Parallel Heuristic Community Detection Method Based on Node Similarity
Community structure discovery can help us better understand the capabilities and functions of the network. However, many existing methods have failed to identify nodes in communities accurately.
Qiang Zhou, Shi-Min Cai, Yi-Cheng Zhang
doaj +1 more source
Deviation results for sparse tables in hashing with linear probing [PDF]
Thierry Klein, Agnès Lagnoux, P. Petit
openalex +1 more source
This review highlights the characteristic odor markers of illicit drugs, emphasizing volatile markers from both natural and synthetic sources, and explores the shift from canine‐based detection to emerging noncontact sensing technologies. Illicit drug use remains a global concern, requiring effective detection methods to counter evolving concealment ...
Minwoo Kim +4 more
wiley +1 more source
GPGPU-BASED COLLISION ATTACK ON QURANIC VERSES HASH TABLES
Mishal Almazrooie
openalex +1 more source

