Results 11 to 20 of about 160,167 (287)
A Semantic Aware Meta-Path Model for Heterogeneous Network Representation Learning
Heterogeneous graph representation learning is to learn effective representations for nodes or (sub)graphs, which preserve node attributes and structural information. However, it is challenging to design a representation learning method for heterogeneous
Yiping Yang +3 more
doaj +1 more source
A Heterogeneous Graph Enhanced LSTM Network for Hog Price Prediction Using Online Discussion
Forecasting the prices of hogs has always been a popular field of research. Such information has played an essential role in decision-making for farmers, consumers, corporations, and governments.
Kai Ye +3 more
doaj +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +4 more sources
MFF-Net: Deepfake Detection Network Based on Multi-Feature Fusion
Significant progress has been made in generating counterfeit images and videos. Forged videos generated by deepfaking have been widely spread and have caused severe societal impacts, which stir up public concern about automatic deepfake detection ...
Lei Zhao +3 more
doaj +1 more source
A national trusted computing strategy [PDF]
Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it continues to decline. The Nation
Dinolt, George W., Levin, Timothy E.
core +1 more source
Trust models in ubiquitous computing [PDF]
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.
Krukow, Karl +2 more
openaire +4 more sources
Towards a new framework for TPM compliance testing [PDF]
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail +2 more
core +2 more sources
Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G ...
Kashif Kifayat +2 more
doaj +1 more source
Measurement and Analysis of P2P IPTV Program Resource
With the rapid development of P2P technology, P2P IPTV applications have received more and more attention. And program resource distribution is very important to P2P IPTV applications.
Wenxian Wang +4 more
doaj +1 more source
Blockchain and Machine Learning in EHR Security: A Systematic Review
Background: The rapid development of modern technologies renders a convenient and efficient solution to implement Electronic Health Records (EHRs) systems. The rapid growth of healthcare data has a distinctive attribute of digital transformations.
Umer Zukaib +5 more
doaj +1 more source

