Results 31 to 40 of about 1,567,762 (328)

On Generating Identifiable Virtual Faces [PDF]

open access: yes, 2021
Face anonymization with generative models have become increasingly prevalent since they sanitize private information by generating virtual face images, ensuring both privacy and image utility. Such virtual face images are usually not identifiable after the removal or protection of the original identity.
arxiv   +1 more source

SDN and Virtualization Solutions for the Internet of Things: A Survey

open access: yesIEEE Access, 2016
The imminent arrival of the Internet of Things (IoT), which consists of a vast number of devices with heterogeneous characteristics, means that future networks need a new architecture to accommodate the expected increase in data generation.
N. Bizanis, F. Kuipers
semanticscholar   +1 more source

Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges

open access: yes, 2017
Service virtualization is an approach that uses virtualized environments to automatically test enterprise services in production-like conditions. Many techniques have been proposed to provide such a realistic environment for enterprise services.
Farahmandpour, Zeinab   +3 more
core   +1 more source

Virtualization for Distributed Ledger Technology (vDLT)

open access: yesIEEE Access, 2018
Recently, with the tremendous development of crypto-currencies, distributed ledger technology (DLT) (e.g., blockchain) has attracted significant attention. The traditional Internet was originally design to handle the exchange of information. With DLT, we
F. Yu   +4 more
semanticscholar   +1 more source

Analisis Performansi Layanan FTP danVideo Streaming berbasis Network Function Virtualization menggunakan Docker Containers

open access: yesJurnal Elkomika, 2018
ABSTRAK Infrastruktur jaringan seperti router, secara tradisional menggunakan hardware yang bersifat proprietary. Teknologi virtualisasi pada fungsi jaringan atau NFV (Network Function Virtualization) membuat layanan ini dapat diimplementasikan sebagai ...
MANZILA IZNIARDI DJOMI   +2 more
doaj   +1 more source

Virtualization: an old concept in a new approach [PDF]

open access: yes, 2007
Virtualization technology is transforming today’s IT community, offering new possi-bilities to improve the performance and efficiency of IT infrastructure by a dynamic mapping of the PC resources, enabling to run multiple applications and operating ...
Banica, Logica   +2 more
core  

Classification of Existing Virtualization Methods Used in Telecommunication Networks

open access: yes, 2019
This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted.
Ageyev, Dmytro   +3 more
core   +1 more source

Enhancing patient engagement in cancer research: a focus on patient‐centric approaches to scientific discovery

open access: yesMolecular Oncology, EarlyView.
Patient engagement involves actively including patients in healthcare decisions and research to ensure care and studies align with their needs. This approach improves outcomes, trust, and communication while fostering collaboration between patients and professionals.
Estela Cepeda   +3 more
wiley   +1 more source

Security Isolation Strategy Mechanism for Lightweight Virtualization Environment

open access: yesITM Web of Conferences, 2017
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian   +3 more
doaj   +1 more source

Virtual index cocycles and invariants of virtual links [PDF]

open access: yesarXiv, 2020
Virtual index cocycle is the 1-cochain that counts virtual crossings in the arcs of a virtual link diagram. We show how this cocycle can be used to reformulate and unify some known invariants of virtual links.
arxiv  

Home - About - Disclaimer - Privacy