Results 21 to 30 of about 1,753,778 (277)
A trustworthy mobile agent infrastructure for network management [PDF]
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core +1 more source
Improved RANSAC features image-matching method based on SURF
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj +1 more source
Security risk assessment of projects in high-risk areas based on attack-defense game model
Assessing the security risk of projects in high-risk areas is particularly important. This paper develops a security risk assessment model for projects in high-risk areas based on the target loss probability model and Bayesian game model.
Yifan Yao, Wenjing Chen
doaj +1 more source
Effects of Degree Correlations in Interdependent Security: Good or Bad?
We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents ...
La, Richard J.
core +1 more source
Providing Authentication & Authorization Mechanisms for Active Service Charging [PDF]
Active network technology enables fast deployment of new network services tailored to the specific needs of end users, among others features.
Alarcos, Bernardo +3 more
core +3 more sources
A machine learning-based approach to ERα bioactivity and drug ADMET prediction
By predicting ERα bioactivity and mining the potential relationship between Absorption, Distribution, Metabolism, Excretion, Toxicity (ADMET) attributes in drug research and development, the development efficiency of specific drugs for breast cancer will
Tianbo An +6 more
doaj +1 more source
Lightweight Security for Network Coding
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows.
Barros, Joao +2 more
core +1 more source
Measurement-device-independent quantum communication with an untrusted source [PDF]
Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security, as compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server.
Xu, Feihu
core +2 more sources
Criminal Trajectory Reconstruction Method Based on a Mobile Reference System
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding +4 more
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source

