Results 11 to 20 of about 80,052 (216)

Statistical Multiplexing Gain Analysis of Processing Resources in Centralized Radio Access Networks

open access: yesIEEE Access, 2019
The next generation of wireless networks faces the challenges of the explosion of mobile data traffic, the associated power consumption, and operation cost.
Zongshuai Zhang   +7 more
doaj   +1 more source

Dimensionality Reduction for Human Activity Recognition Using Google Colab

open access: yesInformation, 2020
Human activity recognition (HAR) is a classification task that involves predicting the movement of a person based on sensor data. As we can see, there has been a huge growth and development of smartphones over the last 10–15 years—they could be used as a
Sujan Ray   +2 more
doaj   +1 more source

Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach

open access: yesIEEE Access, 2023
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil   +3 more
doaj   +1 more source

Publishing Node Strength Distribution With Node Differential Privacy

open access: yesIEEE Access, 2020
The challenge of graph data publishing under node-differential privacy mainly comes from the high sensitivity of the query. Compared with edge-differential privacy that can only protect the relationship between people, node-differential privacy can ...
Ganghong Liu, Xuebin Ma, Wuyungerile Li
doaj   +1 more source

Mobile Trusted Computing

open access: yesProceedings of the IEEE, 2014
Trusted computing technologies for mobile devices have been researched, developed, and deployed over the past decade. Although their use has been limited so far, ongoing standardization may change this by opening up these technologies for easy access by developers and users.
Asokan, N.   +8 more
openaire   +3 more sources

Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme [PDF]

open access: yesEAI Endorsed Transactions on Internet of Things, 2020
Secure data transmission within the wireless sensor networks (WSNs) is a critical issue as they are mostly deployed in the open areas. Moreover, the communication between the cluster head (CH) and the base station(BS) in a hierarchical
Anubrata Chanda   +2 more
doaj   +1 more source

Mobile Edge Computing [PDF]

open access: yes, 2022
This is an open access book. It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks. The book starts with the basic concepts, key techniques and network architectures of MEC.
openaire   +2 more sources

Credibility in Online Social Networks: A Survey

open access: yesIEEE Access, 2019
The importance of information credibility in society cannot be underestimated given that it is at the heart of all decision-making. Generally, more information is better; however, knowing the value of this information is essential for the decision-making
Majed Alrubaian   +5 more
doaj   +1 more source

RLAuth: A Risk-Based Authentication System Using Reinforcement Learning

open access: yesIEEE Access, 2023
Conventional authentication systems, that are used to protect most modern mobile applications, are faced with usability and security problems related to their static and one-shot nature.
Claudy Picard, Samuel Pierre
doaj   +1 more source

Mitigating Trade-Off in Unlicensed Network Optimization Through Machine Learning and Context Awareness

open access: yesIEEE Access, 2023
Unlicensed cellular networks are being deployed worldwide by cellular operators to meet the rising data demands. However, the unlicensed band has existing incumbents such as Wi-Fi and radar systems.
Srikant Manas Kala   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy