Results 11 to 20 of about 160,167 (287)

A Semantic Aware Meta-Path Model for Heterogeneous Network Representation Learning

open access: yesIEEE Access, 2020
Heterogeneous graph representation learning is to learn effective representations for nodes or (sub)graphs, which preserve node attributes and structural information. However, it is challenging to design a representation learning method for heterogeneous
Yiping Yang   +3 more
doaj   +1 more source

A Heterogeneous Graph Enhanced LSTM Network for Hog Price Prediction Using Online Discussion

open access: yesAgriculture, 2021
Forecasting the prices of hogs has always been a popular field of research. Such information has played an essential role in decision-making for farmers, consumers, corporations, and governments.
Kai Ye   +3 more
doaj   +1 more source

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes, 2013
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +4 more sources

MFF-Net: Deepfake Detection Network Based on Multi-Feature Fusion

open access: yesEntropy, 2021
Significant progress has been made in generating counterfeit images and videos. Forged videos generated by deepfaking have been widely spread and have caused severe societal impacts, which stir up public concern about automatic deepfake detection ...
Lei Zhao   +3 more
doaj   +1 more source

A national trusted computing strategy [PDF]

open access: yes, 2002
Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it continues to decline. The Nation
Dinolt, George W., Levin, Timothy E.
core   +1 more source

Trust models in ubiquitous computing [PDF]

open access: yesPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2008
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.
Krukow, Karl   +2 more
openaire   +4 more sources

Towards a new framework for TPM compliance testing [PDF]

open access: yes, 2014
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail   +2 more
core   +2 more sources

Trusted Cloud Computing [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat   +2 more
doaj   +1 more source

Measurement and Analysis of P2P IPTV Program Resource

open access: yesThe Scientific World Journal, 2014
With the rapid development of P2P technology, P2P IPTV applications have received more and more attention. And program resource distribution is very important to P2P IPTV applications.
Wenxian Wang   +4 more
doaj   +1 more source

Blockchain and Machine Learning in EHR Security: A Systematic Review

open access: yesIEEE Access, 2023
Background: The rapid development of modern technologies renders a convenient and efficient solution to implement Electronic Health Records (EHRs) systems. The rapid growth of healthcare data has a distinctive attribute of digital transformations.
Umer Zukaib   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy