Results 31 to 40 of about 65,097 (295)

Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments

open access: yesFuture Internet, 2023
The industrial Internet of things (IIoT) has radically modified industrial environments, not only enabling novel industrial applications but also significantly increasing the amount of generated network traffic.
Paolo Bellavista   +3 more
doaj   +1 more source

Fragmentation thresholds simulated for antibubbles with various infinitesimal elastic shells

open access: yesCurrent Directions in Biomedical Engineering, 2022
Antibubbles are small gas bubbles comprising one or multiple liquid or solid cores, typically surrounded by stabilising shells. Acoustically active microscopic antibubbles have been proposed for use as theranostic agents.
Anderton Nicole, Postema Michiel
doaj   +1 more source

Rapid Convergecast on Commodity Hardware: Performance Limits and Optimal Policies [PDF]

open access: yes, 2010
ReSensePromo
Johansson, Mikael   +4 more
core   +2 more sources

Improved Pilot Logging in DIRAC [PDF]

open access: yesEPJ Web of Conferences
DIRAC is a widely used framework for distributed computing. It works by building a layer between the users and the resources offering a common interface to a number of heterogeneous providers.
Fayer Simon   +2 more
doaj   +1 more source

Discovering Job Preemptions in the Open Science Grid

open access: yes, 2018
The Open Science Grid(OSG) is a world-wide computing system which facilitates distributed computing for scientific research. It can distribute a computationally intensive job to geo-distributed clusters and process job's tasks in parallel.
Bockelman, Brian   +3 more
core   +1 more source

A multi-task learning CNN for image steganalysis [PDF]

open access: yes, 2018
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun   +4 more
core   +1 more source

Neuromorphic Wireless Split Computing With Multi-Level Spikes

open access: yesIEEE Transactions on Machine Learning in Communications and Networking
Inspired by biological processes, neuromorphic computing leverages spiking neural networks (SNNs) to perform inference tasks, offering significant efficiency gains for workloads involving sequential data.
Dengyu Wu   +4 more
doaj   +1 more source

Simplified Distributed Programming with Micro Objects

open access: yes, 2010
Developing large-scale distributed applications can be a daunting task. object-based environments have attempted to alleviate problems by providing distributed objects that look like local objects.
Gwen Salaün   +3 more
core   +3 more sources

Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System [PDF]

open access: yes, 2006
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the
Bolzoni, Damiano   +3 more
core   +5 more sources

A Reversible Data Hiding Algorithm Based on Prediction Error With Large Amounts of Data Hiding in Spatial Domain

open access: yesIEEE Access, 2020
In recent years among data hiding technologies, Reversible Data Hiding(RDH) technology has attracted widespread interest and application, which is to hide the secret information in a carrier image and recover the original carrier image losslessly to ...
Shuai Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy