Results 31 to 40 of about 65,097 (295)
Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments
The industrial Internet of things (IIoT) has radically modified industrial environments, not only enabling novel industrial applications but also significantly increasing the amount of generated network traffic.
Paolo Bellavista+3 more
doaj +1 more source
Fragmentation thresholds simulated for antibubbles with various infinitesimal elastic shells
Antibubbles are small gas bubbles comprising one or multiple liquid or solid cores, typically surrounded by stabilising shells. Acoustically active microscopic antibubbles have been proposed for use as theranostic agents.
Anderton Nicole, Postema Michiel
doaj +1 more source
Rapid Convergecast on Commodity Hardware: Performance Limits and Optimal Policies [PDF]
ReSensePromo
Johansson, Mikael+4 more
core +2 more sources
Improved Pilot Logging in DIRAC [PDF]
DIRAC is a widely used framework for distributed computing. It works by building a layer between the users and the resources offering a common interface to a number of heterogeneous providers.
Fayer Simon+2 more
doaj +1 more source
Discovering Job Preemptions in the Open Science Grid
The Open Science Grid(OSG) is a world-wide computing system which facilitates distributed computing for scientific research. It can distribute a computationally intensive job to geo-distributed clusters and process job's tasks in parallel.
Bockelman, Brian+3 more
core +1 more source
A multi-task learning CNN for image steganalysis [PDF]
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun+4 more
core +1 more source
Neuromorphic Wireless Split Computing With Multi-Level Spikes
Inspired by biological processes, neuromorphic computing leverages spiking neural networks (SNNs) to perform inference tasks, offering significant efficiency gains for workloads involving sequential data.
Dengyu Wu+4 more
doaj +1 more source
Simplified Distributed Programming with Micro Objects
Developing large-scale distributed applications can be a daunting task. object-based environments have attempted to alleviate problems by providing distributed objects that look like local objects.
Gwen Salaün+3 more
core +3 more sources
Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System [PDF]
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the
Bolzoni, Damiano+3 more
core +5 more sources
In recent years among data hiding technologies, Reversible Data Hiding(RDH) technology has attracted widespread interest and application, which is to hide the secret information in a carrier image and recover the original carrier image losslessly to ...
Shuai Li+5 more
doaj +1 more source