Results 31 to 40 of about 567,688 (336)

Resource-constrained classification using a cascade of neural network layers [PDF]

open access: yes, 2015
Deep neural networks are the state of the art technique for a wide variety of classification problems. Although deeper networks are able to make more accurate classifications, the value brought by an additional hidden layer diminishes rapidly.
Bohez, Steven   +5 more
core   +1 more source

Decentralized internet infrastructure

open access: yesDianxin kexue, 2019
Inter-domain routing system,domain name system (DNS) and public key infrastructure (PKI) are the fundamental infrastructures of the internet.These infrastructures help to provide network connectivity,service availability and communication trusts between ...
Bingyang LIU   +6 more
doaj   +2 more sources

A Survey on Handover Management in Mobility Architectures

open access: yes, 2015
This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on ...
Ferretti, Stefano   +2 more
core   +1 more source

Peptide‐based ligand antagonists block a Vibrio cholerae adhesin

open access: yesFEBS Letters, EarlyView.
The structure of a peptide‐binding domain of the Vibrio cholerae adhesin FrhA was solved by X‐ray crystallography, revealing how the inhibitory peptide AGYTD binds tightly at its Ca2+‐coordinated pocket. Structure‐guided design incorporating D‐amino acids enhanced binding affinity, providing a foundation for developing anti‐adhesion therapeutics ...
Mingyu Wang   +9 more
wiley   +1 more source

Multi-layer DDoS attacks detection with mitigation in IoT-enabled sensor network

open access: yesCybersecurity
The Internet of Things enabled Wireless Sensor Networks (IoT-enabled WSNs) are highly susceptible to a wide range of Distributed Denial of Service (DDoS) attacks.
Kavita S. Kumavat, Joanne Gomes
doaj   +1 more source

Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain

open access: yesInternational Journal of Distributed Sensor Networks, 2019
The developments of Narrow Band Internet of Things have attracted much attention from both academia and industry nowadays. While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security ...
Hanshu Hong, Bing Hu, Zhixin Sun
doaj   +1 more source

Sequence determinants of RNA G‐quadruplex unfolding by Arg‐rich regions

open access: yesFEBS Letters, EarlyView.
We show that Arg‐rich peptides selectively unfold RNA G‐quadruplexes, but not RNA stem‐loops or DNA/RNA duplexes. This length‐dependent activity is inhibited by acidic residues and is conserved among SR and SR‐related proteins (SRSF1, SRSF3, SRSF9, U1‐70K, and U2AF1).
Naiduwadura Ivon Upekala De Silva   +10 more
wiley   +1 more source

Effective video multicast over wireless internet [PDF]

open access: yes, 2005
With the rapid growth of wireless networks and great success of Internet video, wireless video services are expected to be widely deployed in the near future. As different types of wireless networks are converging into all IP networks, i.e., the Internet,
Li, B, Lin, C, Ni, Q, Yin, H
core  

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Network-Layer Accountability Protocols: A Survey

open access: yesIEEE Access, 2018
Today’s Internet is vulnerable to numerous attacks, including source spoofing, distributed denial of service, prefix hijacking, and route forgery.
Lin He, Ying Liu, Gang Ren
doaj   +1 more source

Home - About - Disclaimer - Privacy