Results 31 to 40 of about 1,567,762 (328)
On Generating Identifiable Virtual Faces [PDF]
Face anonymization with generative models have become increasingly prevalent since they sanitize private information by generating virtual face images, ensuring both privacy and image utility. Such virtual face images are usually not identifiable after the removal or protection of the original identity.
arxiv +1 more source
SDN and Virtualization Solutions for the Internet of Things: A Survey
The imminent arrival of the Internet of Things (IoT), which consists of a vast number of devices with heterogeneous characteristics, means that future networks need a new architecture to accommodate the expected increase in data generation.
N. Bizanis, F. Kuipers
semanticscholar +1 more source
Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges
Service virtualization is an approach that uses virtualized environments to automatically test enterprise services in production-like conditions. Many techniques have been proposed to provide such a realistic environment for enterprise services.
Farahmandpour, Zeinab+3 more
core +1 more source
Virtualization for Distributed Ledger Technology (vDLT)
Recently, with the tremendous development of crypto-currencies, distributed ledger technology (DLT) (e.g., blockchain) has attracted significant attention. The traditional Internet was originally design to handle the exchange of information. With DLT, we
F. Yu+4 more
semanticscholar +1 more source
ABSTRAK Infrastruktur jaringan seperti router, secara tradisional menggunakan hardware yang bersifat proprietary. Teknologi virtualisasi pada fungsi jaringan atau NFV (Network Function Virtualization) membuat layanan ini dapat diimplementasikan sebagai ...
MANZILA IZNIARDI DJOMI+2 more
doaj +1 more source
Virtualization: an old concept in a new approach [PDF]
Virtualization technology is transforming today’s IT community, offering new possi-bilities to improve the performance and efficiency of IT infrastructure by a dynamic mapping of the PC resources, enabling to run multiple applications and operating ...
Banica, Logica+2 more
core
Classification of Existing Virtualization Methods Used in Telecommunication Networks
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro+3 more
core +1 more source
Patient engagement involves actively including patients in healthcare decisions and research to ensure care and studies align with their needs. This approach improves outcomes, trust, and communication while fostering collaboration between patients and professionals.
Estela Cepeda+3 more
wiley +1 more source
Security Isolation Strategy Mechanism for Lightweight Virtualization Environment
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian+3 more
doaj +1 more source
Virtual index cocycles and invariants of virtual links [PDF]
Virtual index cocycle is the 1-cochain that counts virtual crossings in the arcs of a virtual link diagram. We show how this cocycle can be used to reformulate and unify some known invariants of virtual links.
arxiv