Results 1 to 10 of about 733,883 (170)
Quality-time-complexity universal intelligence measurement [PDF]
Purpose - With the development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more autonomous and smart.
Jing Liu +5 more
doaj +3 more sources
Mobile communications and computing has changed forever the way people communicate and interact and it has made “any information, any device, any network, anytime, anywhere” an everyday reality which we all take for granted. This chapter discusses the main research and development in the mobile technology and standards that made ubiquity a reality ...
Anastasis A. Sofokleous +2 more
+5 more sources
UbiMeta: A Ubiquitous Operating System Model for Metaverse
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen +10 more
doaj +1 more source
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink +6 more
doaj +1 more source
Collaborative Mobile-To-Mobile Computation Offloading [PDF]
It is common practice for mobile devices to offload computationally heavy tasks off to a cloud, which has greater computational resources. In this paper, we consider an environment in which computational offloading is made among collaborative mobile devices.We call such an environment a mobile device cloud (MDC).
Abderrahmen Mtibaa +4 more
openaire +2 more sources
High-fidelity point cloud completion with low-resolution recovery and noise-aware upsampling
Completing an unordered partial point cloud is a challenging task. Existing approaches that rely on decoding a latent feature to recover the complete shape, often lead to the completed point cloud being over-smoothing, losing details, and noisy.
Ren-Wu Li +4 more
doaj +1 more source
Notebooks are replacing other personal computers in everyday use. Efficient use of such mobile devices requires a creation of an "illusion" of permanent high speed on-line connection. Infrastructure support including middle-ware services is necessary for such environment.
Matyska, Ludek, Hladka, Eva
+7 more sources
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj +1 more source
Smart Contract-Based Trusted Content Retrieval Mechanism for NDN
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song +4 more
doaj +1 more source
Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang +7 more
doaj +1 more source

