Results 1 to 10 of about 4,484,297 (341)
>Quality-time-complexity universal intelligence measurement [PDF]
Purpose - With development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more and more autonomous and smart. Therefore, there is a growing demand to develop a universal intelligence measurement so
Wen Ji+5 more
doaj +3 more sources
2020 Index IEEE Transactions on Mobile Computing Vol. 19
This index covers all technical items—papers, correspondence, reviews, etc.—that appeared in this periodical during 2020, and items from previous years that were commented upon or corrected in 2020. Departments and other items may also be covered if they
semanticscholar +1 more source
UbiMeta: A Ubiquitous Operating System Model for Metaverse
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen+10 more
doaj +1 more source
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink+6 more
doaj +1 more source
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj +1 more source
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system.
Bin Liao+4 more
semanticscholar +1 more source
Mobile Edge Computing: A Survey on Architecture and Computation Offloading [PDF]
Technological evolution of mobile user equipment (UEs), such as smartphones or laptops, goes hand-in-hand with evolution of new mobile applications. However, running computationally demanding applications at the UEs is constrained by limited battery ...
Pavel Mach, Zdenek Becvar
semanticscholar +1 more source
Smart Contract-Based Trusted Content Retrieval Mechanism for NDN
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song+4 more
doaj +1 more source
The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated ...
Yushan Siriwardhana+3 more
semanticscholar +1 more source
Mobility signatures: a tool for characterizing cities using intercity mobility flows [PDF]
Understanding the patterns of human mobility between cities has various applications from transport engineering to spatial modeling of the spreading of contagious diseases. We adopt a city-centric, data-driven perspective to quantify such patterns and introduce the mobility signature as a tool for understanding how a city (or a region) is embedded in ...
arxiv +1 more source