Results 11 to 20 of about 579,566 (286)

Tokenization in the Theory of Knowledge

open access: yesEncyclopedia, 2023
Tokenization is a procedure for recovering the elements of interest in a sequence of data. This term is commonly used to describe an initial step in the processing of programming languages, and also for the preparation of input data in the case of ...
Robert Friedman
doaj   +1 more source

Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token

open access: yesSensors, 2023
With the promotion of Industry 4.0, which emphasizes interconnected and intelligent devices, several factories have introduced numerous terminal Internet of Things (IoT) devices to collect relevant data or monitor the health status of equipment.
Yu-Sheng Yang   +5 more
doaj   +1 more source

Features of the functioning of the token blood in the texts of Ukrainian folk spells

open access: yesВісник Харківського національного університету імені В. Н. Каразіна. Серія Філологія. Vìsnik Harkìvsʹkogo nacìonalʹnogo unìversitetu ìmenì V.N. Karazìna. Serìâ Fìlologìâ., 2022
The article examines the peculiarities of the functioning of the token blood in the texts of Ukrainian spells. In the article we determine dominant thematic groups of spells, in which the semantic content of the analyzed token is reflected.
Svitlana Shuliak
doaj   +1 more source

Token Graphs [PDF]

open access: yesGraphs and Combinatorics, 2011
For a graph $G$ and integer $k\geq1$, we define the token graph $F_k(G)$ to be the graph with vertex set all $k$-subsets of $V(G)$, where two vertices are adjacent in $F_k(G)$ whenever their symmetric difference is a pair of adjacent vertices in $G$.
Fabila-Monroy, Ruy   +5 more
openaire   +3 more sources

Use of Information Technology by Transport Enterprises: Cryptocurrency Mining Mechanism Based on Blockchain Technology

open access: yesНаука и техника, 2020
Currently, the migration fact of many transport enterprises to the Internet cloud has been noted, where the use ofinformation technology is one of the factors for the active use of  enterprise innovative potential, revealing new opportunity to increase ...
D. N. Mesnik
doaj   +1 more source

FL-Incentivizer: FL-NFT and FL-Tokens for Federated Learning Model Trading and Training

open access: yesIEEE Access, 2023
Federated learning (FL) is an on-device distributed learning scheme that does not require training devices to transfer their data to a centralized facility. The goal of federated learning is to learn a global model over several iterations.
Umer Majeed   +4 more
doaj   +1 more source

Identifying Real Estate Opportunities Using Machine Learning

open access: yesApplied Sciences, 2018
The real estate market is exposed to many fluctuations in prices because of existing correlations with many variables, some of which cannot be controlled or might even be unknown. Housing prices can increase rapidly (or in some cases, also drop very fast)
Alejandro Baldominos   +5 more
doaj   +1 more source

Crypto as an object of contractual obligation under the Regulation on Markets in Crypto Asset (MICA) and the Digital Assets Act (DAA) [PDF]

open access: yesZbornik Radova Pravnog Fakulteta u Nišu, 2023
The paper examines the legal status and treatment of crypto assets in the context of contractual obligations. The analysis begins by considering the evolution from cryptocurrencies to crypto-goods, with special reference to definitions and terms used in ...
Cvetković Mihajlo
doaj   +1 more source

SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core   +1 more source

Self-Stabilizing Token Distribution with Constant-Space for Trees [PDF]

open access: yes, 2018
Self-stabilizing and silent distributed algorithms for token distribution in rooted tree networks are given. Initially, each process of a graph holds at most l tokens.
Datta, Ajoy K.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy