Results 21 to 30 of about 79,362 (328)

Data Offloading in Mobile Edge Computing: A Coalition and Pricing Based Approach

open access: yesIEEE Access, 2018
Mobile edge computing (MEC) that affords service to the vicinity of mobile devices (MDs) has become a key technology for future network. Offloading big data to the MEC server for preprocessing is an attractive approach of MDs.
Tian Zhang
doaj   +1 more source

Does Gesture Lighten the Load? The Case of Verbal Analogies

open access: yesFrontiers in Psychology, 2020
Gesturing has been shown to relay benefits to speakers and listeners alike. Speakers, for instance, may be able to reduce their working memory load through gesture. Studies with children and adults have demonstrated that gesturing while describing how to
Acacia L. Overoye, Margaret Wilson
doaj   +1 more source

Mobile, collaborative augmented reality using cloudlets [PDF]

open access: yes, 2013
The evolution in mobile applications to support advanced interactivity and demanding multimedia features is still ongoing. Novel application concepts (e.g.
Bohez, Steven   +4 more
core   +1 more source

Morphological Computation: Nothing but Physical Computation

open access: yesEntropy, 2018
The purpose of this paper is to argue against the claim that morphological computation is substantially different from other kinds of physical computation.
Marcin Miłkowski
doaj   +1 more source

Take a load off: examining partial and complete cognitive offloading of medication information

open access: yesCognitive Research, 2023
Although cognitive offloading, or the use of physical action to reduce internal cognitive demands, is a commonly used strategy in everyday life, relatively little is known about the conditions that encourage offloading and the memorial consequences of ...
Lauren L. Richmond   +3 more
doaj   +1 more source

Mobile Adhoc Offloading

open access: yesCoRR, 2014
This problem is a series of biddings and auctions. Each round of bidding and auction are different from previous ones because of the change of network topology, variance of budget set by the sender, and possible evolution of strategies of other nodes. The huge strategy space of relay nodes makes the formulation to a game very difficult.
Di Li, Asya Mitseva
openaire   +2 more sources

Offloading with IFOM: The uplink case [PDF]

open access: yes2014 IEEE Global Communications Conference, 2014
Mobile data offloading has been proposed as a solution for network congestion. However, the majority of the state-of-the-art is focused on the downlink offloading, while the change of mobile user habits, like mobile content creation and uploading, makes uplink offloading a rising issue.
Miliotis, Vasileios   +2 more
openaire   +2 more sources

Discovery and Biosynthesis of the Novel Glycotetrapeptide Antibiotic Biffamycin A

open access: yesAngewandte Chemie, EarlyView.
Genetic de‐regulation of a silent biosynthetic pathway allowed isolation and characterisation of a novel glycopeptide antibiotic named biffamycin A, which harbours unprecedented 5‐chloro‐4‐methoxy tryptophan and 3R‐hydroxy(α‐D‐mannoysl)‐D‐lysine moieties and is bioactive against MRSA and VRSA.
Michael W. Brigham   +11 more
wiley   +2 more sources

Individual differences in cognitive offloading: a comparison of intention offloading, pattern copy, and short-term memory capacity

open access: yesCognitive Research, 2021
The cognitive load of many everyday life tasks exceeds known limitations of short-term memory. One strategy to compensate for information overload is cognitive offloading which refers to the externalization of cognitive processes such as reminder setting
Hauke S. Meyerhoff   +3 more
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy