Results 1 to 10 of about 4,484,297 (341)

>Quality-time-complexity universal intelligence measurement [PDF]

open access: yesInternational Journal of Crowd Science, 2018
Purpose - With development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more and more autonomous and smart. Therefore, there is a growing demand to develop a universal intelligence measurement so
Wen Ji   +5 more
doaj   +3 more sources

2020 Index IEEE Transactions on Mobile Computing Vol. 19

open access: yesIEEE Transactions on Mobile Computing, 2021
This index covers all technical items—papers, correspondence, reviews, etc.—that appeared in this periodical during 2020, and items from previous years that were commented upon or corrected in 2020. Departments and other items may also be covered if they

semanticscholar   +1 more source

UbiMeta: A Ubiquitous Operating System Model for Metaverse

open access: yesInternational Journal of Crowd Science, 2023
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen   +10 more
doaj   +1 more source

Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B

open access: yesBig Data and Cognitive Computing, 2021
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink   +6 more
doaj   +1 more source

A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control

open access: yesIEEE Access, 2020
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj   +1 more source

Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review

open access: yesIEEE Access, 2020
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system.
Bin Liao   +4 more
semanticscholar   +1 more source

Mobile Edge Computing: A Survey on Architecture and Computation Offloading [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2017
Technological evolution of mobile user equipment (UEs), such as smartphones or laptops, goes hand-in-hand with evolution of new mobile applications. However, running computationally demanding applications at the UEs is constrained by limited battery ...
Pavel Mach, Zdenek Becvar
semanticscholar   +1 more source

Smart Contract-Based Trusted Content Retrieval Mechanism for NDN

open access: yesIEEE Access, 2020
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song   +4 more
doaj   +1 more source

A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects

open access: yesIEEE Communications Surveys and Tutorials, 2021
The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated ...
Yushan Siriwardhana   +3 more
semanticscholar   +1 more source

Mobility signatures: a tool for characterizing cities using intercity mobility flows [PDF]

open access: yesFront. Big Data (2022) 5:822889, 2021
Understanding the patterns of human mobility between cities has various applications from transport engineering to spatial modeling of the spreading of contagious diseases. We adopt a city-centric, data-driven perspective to quantify such patterns and introduce the mobility signature as a tool for understanding how a city (or a region) is embedded in ...
arxiv   +1 more source

Home - About - Disclaimer - Privacy