Results 11 to 20 of about 282,971 (296)

Ubiquitous Human Computing [PDF]

open access: yesSSRN Electronic Journal, 2013
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a thumb tack and as large as a worldwide product distribution chain. What could happen when people are so readily networked?
Zittrain, Jonathan L.
core   +5 more sources

Trust models in ubiquitous computing [PDF]

open access: yesPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2008
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect.
Krukow, Karl   +2 more
core   +5 more sources

PAC-GPT: A Novel Approach to Generating Synthetic Network Traffic With GPT-3

open access: yesIEEE Access, 2023
The application of machine learning models, particularly in cybersecurity, has surged significantly in the past few years. However, the effectiveness of these models is predominantly tethered to the quality and breadth of the training data they ingest ...
Danial Khosh Kholgh, Panos Kostakos
doaj   +1 more source

Ubiquitous computing

open access: yes, 2021
This mixed methods study explored the relationship between ubiquitous computing and the systemic transformation of a high school focused on 21st century teaching and learning. Previous research studies focused on the benefits of 1:1 laptop environments: however, many schools implemented ubiquitous computing without a systems approach.
Shitong Mao   +6 more
openaire   +2 more sources

A dark and stormy night: Reallocation storms in edge computing

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Efficient resource usage in edge computing requires clever allocation of the workload of application components. In this paper, we show that under certain circumstances, the number of superfluous workload reallocations from one edge server to another may
Lauri LovĂ©n   +4 more
doaj   +1 more source

SupCAM: Chromosome cluster types identification using supervised contrastive learning with category-variant augmentation and self-margin loss

open access: yesFrontiers in Genetics, 2023
Chromosome segmentation is a crucial analyzing task in karyotyping, a technique used in experiments to discover chromosomal abnormalities. Chromosomes often touch and occlude with each other in images, forming various chromosome clusters. The majority of
Chunlong Luo   +3 more
doaj   +1 more source

Ubiquitous security for ubiquitous computing [PDF]

open access: yesInformation Security Technical Report, 2007
The potential for rapid and diverse interconnectivity through devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However, this has resulted in equally ubiquitous security risks due principally to the number and complexity of services being run over such networks.
Hayat, Zia, Reeve, Jeff, Boutle, Chris
openaire   +2 more sources

A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection

open access: yesSensors, 2022
Intrusion detection systems (IDS) are crucial for network security because they enable detection of and response to malicious traffic. However, as next-generation communications networks become increasingly diversified and interconnected, intrusion ...
Saeid Sheikhi, Panos Kostakos
doaj   +1 more source

Emotional Response to Vibrothermal Stimuli

open access: yesApplied Sciences, 2021
Emotional response to haptic stimuli is a widely researched topic, but the combination of vibrotactile and thermal stimuli requires more attention. The purpose of this study is to investigate emotional response to vibrothermal stimulation by combining ...
Yatiraj Shetty   +4 more
doaj   +1 more source

Hang-Time HAR: A Benchmark Dataset for Basketball Activity Recognition Using Wrist-Worn Inertial Sensors

open access: yesSensors, 2023
We present a benchmark dataset for evaluating physical human activity recognition methods from wrist-worn sensors, for the specific setting of basketball training, drills, and games.
Alexander Hoelzemann   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy