Results 1 to 10 of about 739,960 (193)
Quality-time-complexity universal intelligence measurement [PDF]
Purpose - With the development of machine learning techniques, the artificial intelligence systems such as crowd networks are becoming more autonomous and smart.
Jing Liu +5 more
doaj +3 more sources
UbiMeta: A Ubiquitous Operating System Model for Metaverse
The metaverse signifies the amalgamation of virtual and tangible realms through human-computer interaction. The seamless integration of human, cyber, and environments within ubiquitous computing plays a pivotal role in fully harnessing the metaverse’s ...
Yiqiang Chen +10 more
doaj +1 more source
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing.
Dustin M. Mink +6 more
doaj +1 more source
Collaborative Mobile-To-Mobile Computation Offloading [PDF]
It is common practice for mobile devices to offload computationally heavy tasks off to a cloud, which has greater computational resources. In this paper, we consider an environment in which computational offloading is made among collaborative mobile devices.We call such an environment a mobile device cloud (MDC).
Abderrahmen Mtibaa +4 more
openaire +2 more sources
High-fidelity point cloud completion with low-resolution recovery and noise-aware upsampling
Completing an unordered partial point cloud is a challenging task. Existing approaches that rely on decoding a latent feature to recover the complete shape, often lead to the completed point cloud being over-smoothing, losing details, and noisy.
Ren-Wu Li +4 more
doaj +1 more source
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj +1 more source
Smart Contract-Based Trusted Content Retrieval Mechanism for NDN
Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following challenges,
Tingting Song +4 more
doaj +1 more source
The challenges of mobile computing [PDF]
The technical challenges that mobile computing must surmount to achieve its potential are hardly trivial. Some of the challenges in designing software for mobile computing systems are quite different from those involved in the design of software for today's stationary networked systems.
George Forman, John Zahorjan
openaire +1 more source
Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang +7 more
doaj +1 more source
Dimensionality Reduction for Human Activity Recognition Using Google Colab
Human activity recognition (HAR) is a classification task that involves predicting the movement of a person based on sensor data. As we can see, there has been a huge growth and development of smartphones over the last 10–15 years—they could be used as a
Sujan Ray +2 more
doaj +1 more source

