Results 21 to 30 of about 1,304 (68)
Grid computing is an emerging technology that enabled the heterogeneous collection of data and provisioning of services to the users. Due to the high amount of incoming heterogeneous request, grid computing needs an efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements.
Gangasandra Mahadevaiah Kiran +1 more
wiley +1 more source
Mining Characteristics of Vulnerable Smart Contracts across Lifecycle Stages
This paper conducts the first empirical study on smart contract security across three lifecycle stages: deployment and execution, upgrade, and destruction. It identifies seven vulnerability‐related features and applies them to machine learning models, revealing stage‐specific vulnerability patterns and improving detection accuracy.
Hongli Peng, Wenkai Li, Xiaoqi Li
wiley +1 more source
Background: The Internet of Things (IoT) represents one of the fastest‐expanding developments in the computer industry. However, the inherently hostile environment of the internet makes IoT systems vulnerable. A popular and promising method for detecting cyberattacks is machine learning (ML), which produces excellent outcomes for identified attacks ...
R. S. Ramya, S. Jayanthy, Peican Zhu
wiley +1 more source
The rapid expansion of the cloud service industry has raised the critical challenge of ensuring efficient job allocation and trust within a backdrop of heightened privacy concerns. Existing models often struggle to achieve an optimal balance between these factors, particularly in dynamic cloud environments.
Himani Saini +9 more
wiley +1 more source
This article explores the security challenges of authentication, authorisation, and access control (AAA) in smart city ecosystems, where collaborative smart services aim to enhance urban living. Through a systematic literature review (2017–2024), it evaluates emerging technologies like blockchain, AI, and quantum computing, focusing on their ability to
Usama Antuley +3 more
wiley +1 more source
Optimising Internet of Things (IoT) Performance Through Cloud, Fog and Edge Computing Architecture
This review examines the integration of IoT with cloud, fog, and edge computing, highlighting their collective potential to enhance scalability, reduce latency, and improve computational efficiency. Whereas cloud computing offers scalable processing, fog and edge computing mitigate latency issues, improving response times by up to 40% and 30 ...
Shams Forruque Ahmed +5 more
wiley +1 more source
An AI knowledge‐based system for police assistance in crime investigation
Abstract The fight against crime is often an arduous task overall when huge amounts of data have to be inspected, as is currently the case when it comes for example in the detection of criminal activity on the dark web. This work presents and describes an artificial intelligence (AI) based system that combines various tools to assist police or law ...
Carlos Fernandez‐Basso +4 more
wiley +1 more source
Stroke disease has been the leading cause of death globally for the last several decades. Thus, the death rate can be decreased by early recognition of disease and ongoing surveillance. However, the largest obstacle to perform advanced analytics using the conventional approach is the growth of massive amount of data from various sources, including ...
Assefa Senbato Genale +2 more
wiley +1 more source
mRNAs of plants and green algae lack the m7G cap‐1 structure
New Phytologist, Volume 246, Issue 2, Page 396-401, April 2025.
Chen Xiao +7 more
wiley +1 more source
Guest Editor's Note: High-Level Parallel Programming 2021. [PDF]
Niculescu V, Loulergue F.
europepmc +1 more source

