Results 51 to 60 of about 13,975 (217)

Exploring Influence Factors on LLM Suitability for No‐Code Development of End User Applications

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 96-118, January 2026.
ABSTRACT Context/Problem Statement No‐Code Development Platforms (NCDPs) empower non‐technical end users to build applications tailored to their specific demands without writing code. While NCDPs lower technical barriers, users still require some technical knowledge, for example, to structure process steps or define event‐action rules.
Minghe Wang   +4 more
wiley   +1 more source

Enabling Serverless Deployment of Large-Scale AI Workloads

open access: yesIEEE Access, 2020
We propose a set of optimization techniques for transforming a generic AI codebase so that it can be successfully deployed to a restricted serverless environment, without compromising capability or performance.
Angelos Christidis   +3 more
doaj   +1 more source

A Distributed Federated Reinforcement Learning Approach for Scheduling User‐Side Flexibility Resources in Virtual Power Plants

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
This paper proposes a multi‐virtual power plant (VPP) coordination framework that aggregates distributed flexibility resources, for example, electric vehicles, battery storage and shiftable loads, to enhance system adaptability. We quantify flexibility supply–demand imbalances using unified margin and risk indices, then formulate a cost‐flexibility co ...
Heng Hu   +5 more
wiley   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

Extending the Capacity of IoT Devices with Serverless Services for a Face Detection Application: A practical evaluation

open access: yesActa Scientiarum: Technology
IoT systems have limitations and challenges in many ways, such as performance, energy consumption, memory footprint and data storage. One possible solution to minimize these limitations is to integrate IoT devices with the serverless cloud computing ...
João Pedro Bach Dotta   +2 more
doaj   +1 more source

Serverless Geospatial Data Processing Workflow System Design

open access: yesISPRS International Journal of Geo-Information, 2021
Geospatial data and related technologies have become an increasingly important aspect of data analysis processes, with their prominent role in most of them.
Mete Ercan Pakdil, Rahmi Nurhan Çelik
doaj   +1 more source

Semantic query languages for knowledge-based web services in a construction context [PDF]

open access: yes, 2019
Since the early 2000s, different frameworks were set up to enable web-based collaboration in building projects. Unfortunately, none of these initiatives was granted a long life.
Beetz, Jakob   +4 more
core  

Quantum Computing: Foundations, Architecture and Applications

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
This paper presents a study on quantum computing's theoretical foundations and applications, illustrated by a quantum circuit diagram featuring gates and measurements that demonstrate qubit manipulation and entanglement. ABSTRACT Quantum computing exploits the principles of quantum mechanics to address computational problems that are intractable to ...
Christopher Columbus Chinnappan   +4 more
wiley   +1 more source

Constructing a Shariah Document Screening Prototype Based on Serverless Architecture

open access: yesComputers, 2023
The aim of this research is to discuss the groundwork of building an Islamic Banking Document Screening Prototype based on a serverless architecture framework.
Marhanum Che Mohd Salleh   +3 more
doaj   +1 more source

K8sidecar: A Modular Kubernetes Chain of Sidecar Proxies for Microservices and Serverless Architectures

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1305-1319, August 2025.
ABSTRACT Background Modern microservice architectures demand not only modularity, scalability, and maintainability but also adaptation to dynamic requirements. For applications deployed on Kubernetes, sidecar proxies have been used to separate the operational features (such as security, networking, or monitoring) from the application business logic by ...
Andoni Salcedo‐Navarro   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy