Results 21 to 30 of about 2,117,368 (198)
To date, more than 263 million people have been infected with SARS-CoV-2 during the COVID-19 pandemic. In many countries, the global spread occurred in multiple pandemic waves characterized by the emergence of new SARS-CoV-2 variants.
Vedat Durmaz +17 more
doaj +1 more source
Flexible and Efficient Inference with Particles for the Variational Gaussian Approximation
Variational inference is a powerful framework, used to approximate intractable posteriors through variational distributions. The de facto standard is to rely on Gaussian variational families, which come with numerous advantages: they are easy to sample ...
Théo Galy-Fajou +2 more
doaj +1 more source
This paper focuses on the challenges associated with composing and pricing web services. We present the results of an online experiment, where subjects were confronted with a variety of choices and decisions relating to web service markets and service composition.
Oliver Günther 0001 +2 more
openaire +6 more sources
Estimating water saturation via conventional logging tool such as resistivity cannot provide an accurate solution in a formation with low conductivity water and tight porosity. As an alternative, we employed a dielectric permittivity, which makes it easy
Yongchae Cho +3 more
doaj +1 more source
The EEE-05 Challenge: A New Web Service Discovery and Composition Competition [PDF]
With growing acceptance of service-oriented computing, an emerging area of research is the investigation of technologies that will enable the discovery and composition of web services.
Blake, M. Brian +2 more
core +3 more sources
Fast and scalable routing protocols for data center networks
Data center networks may comprise tens or hundreds of thousands of nodes, and, naturally, suffer from frequent software and hardware failures as well as link congestions. Packets are routed along the shortest paths with sufficient resources to facilitate
Mihailo Vesović +2 more
doaj +1 more source
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
This paper defines a new practical construction for a code-based signature scheme. We introduce a new protocol that is designed to follow the recent paradigm known as “Sigma protocol with helper”, and prove that the protocol’s security reduces directly ...
Shay Gueron +2 more
doaj +1 more source
Leveraging cloud compute and open source software to generate 3D models from drone photography [PDF]
Modern drone platforms provide the opportunity to capture large quantities of high quality, geotagged aerial imagery quickly and over large distances, at a relatively low cost. As organisations increasingly turn to digital twin technology to manage their
G. Biegel
doaj +1 more source
Fast and Clean: Auditable high-performance assembly via constraint solving
Handwritten assembly is a widely used tool in the development of highperformance cryptography: By providing full control over instruction selection, instruction scheduling, and register allocation, highest performance can be unlocked.
Amin Abdulrahman +3 more
doaj +1 more source
Configurations of Web Services
AbstractThe quest for sound foundations for the orchestration of web services is still open. To a great extent its relevance comes from the possibility of defining formal semantics for new language standards (like BPEL4WS or WS-CDL) in this emerging and challenging technology. As a step in that direction, this paper resorts to a notion of configuration,
Marco Antonio Barbosa +1 more
openaire +2 more sources

