Results 31 to 40 of about 911,528 (286)
Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems [PDF]
This paper proposes a low-latency secure mobile edge computing (MEC) system where multiple users offload computing tasks to a base station in the presence of an eavesdropper.
Elkashlan, Maged +7 more
core +2 more sources
Impossible Differential Cryptanalysis of GRANULE Algorithm [PDF]
The GRANULE algorithm is an ultra-lightweight block cipher algorithm with good hardware and software implementation performance,but now the algorithm lacks security estimation result under impossible differential analysis.Therefore,using middle error ...
SHI Shuying, HE Jun
doaj +1 more source
A simulated study on intermittent flame feature of mass fire in channel structure
Compared with the intermittent thermal-flame behavior in ordinary building, the flame behavior may also occur in mass fire inside channel structures, accompanied by distinct thermal characteristics, which is rarely studied.
Xi Zhang, Qing Lai, Huang Xiao, Jie Li
doaj +1 more source
Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers
With the rapid growth of technology in recent years, we are surrounded by or even dependent on the use of technological devices such as smartphones as they are now an indispensable part of our life.
Majid Hatamian
doaj +1 more source
Human Autonomy in the Era of Augmented Reality—A Roadmap for Future Work
Augmented reality (AR) has found application in online games, social media, interior design, and other services since the success of the smartphone game Pokémon Go in 2016.
David Harborth
doaj +1 more source
To address the high-precision trajectory tracking task of uncertain robotic manipulators, a continuous sliding mode control (CSMC) scheme based on time-varying disturbance estimation and compensation is developed.
Juan Xian +3 more
doaj +1 more source
Securing route optimisation in NEMO [PDF]
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc,and Wireless Networks. 4-6 April 2005. Riva del Garda, Trentino, ItalyThe network mobility (NEMO) basic support protocol enables mobile networks to change their point of ...
Bagnulo Braun, Marcelo Gabriel +3 more
core +3 more sources
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Mobile integrated conditional access system [PDF]
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N +4 more
core +1 more source
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King +10 more
wiley +1 more source

