Results 11 to 20 of about 282,971 (296)
Ubiquitous Human Computing [PDF]
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a thumb tack and as large as a worldwide product distribution chain. What could happen when people are so readily networked?
Zittrain, Jonathan L.
core +5 more sources
Trust models in ubiquitous computing [PDF]
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect.
Krukow, Karl +2 more
core +5 more sources
PAC-GPT: A Novel Approach to Generating Synthetic Network Traffic With GPT-3
The application of machine learning models, particularly in cybersecurity, has surged significantly in the past few years. However, the effectiveness of these models is predominantly tethered to the quality and breadth of the training data they ingest ...
Danial Khosh Kholgh, Panos Kostakos
doaj +1 more source
This mixed methods study explored the relationship between ubiquitous computing and the systemic transformation of a high school focused on 21st century teaching and learning. Previous research studies focused on the benefits of 1:1 laptop environments: however, many schools implemented ubiquitous computing without a systems approach.
Shitong Mao +6 more
openaire +2 more sources
A dark and stormy night: Reallocation storms in edge computing
Efficient resource usage in edge computing requires clever allocation of the workload of application components. In this paper, we show that under certain circumstances, the number of superfluous workload reallocations from one edge server to another may
Lauri Lovén +4 more
doaj +1 more source
Chromosome segmentation is a crucial analyzing task in karyotyping, a technique used in experiments to discover chromosomal abnormalities. Chromosomes often touch and occlude with each other in images, forming various chromosome clusters. The majority of
Chunlong Luo +3 more
doaj +1 more source
Ubiquitous security for ubiquitous computing [PDF]
The potential for rapid and diverse interconnectivity through devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However, this has resulted in equally ubiquitous security risks due principally to the number and complexity of services being run over such networks.
Hayat, Zia, Reeve, Jeff, Boutle, Chris
openaire +2 more sources
Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion ...
Saeid Sheikhi, Panos Kostakos
doaj +1 more source
Emotional Response to Vibrothermal Stimuli
Emotional response to haptic stimuli is a widely researched topic, but the combination of vibrotactile and thermal stimuli requires more attention. The purpose of this study is to investigate emotional response to vibrothermal stimulation by combining ...
Yatiraj Shetty +4 more
doaj +1 more source
We present a benchmark dataset for evaluating physical human activity recognition methods from wrist-worn sensors, for the specific setting of basketball training, drills, and games.
Alexander Hoelzemann +4 more
doaj +1 more source

