We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. 50 Jahre ICT an der TU Wien – 20 Jahre Forschungsgruppe Embedded Systems an der FH Technikum Wien

    In Austria, Universities of Applied Sciences (UAS) are a relatively new type of education when compared to other countries. Research and development...

    Martin Horauer, Peter Rössler in e+i Elektrotechnik und Informationstechnik
    Article 15 July 2024
  2. Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach

    Efficient virtual machine (VM) placement is vital for optimizing the performance of cloud data centers. While recent studies have addressed this...

    Arezoo Ghasemi, Amin Keshavarzi in Cluster Computing
    Article 15 July 2024
  3. Combinatorial refinement on circulant graphs

    The combinatorial refinement techniques have proven to be an efficient approach to isomorphism testing for particular classes of graphs. If the...

    Laurence Kluge in computational complexity
    Article Open access 15 July 2024
  4. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  5. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  6. DNA codes over \(GR(2^{3},d)[X]/\langle X^{2},2X \rangle\)

    The main results of this paper are in two directions. First, the family of finite local rings of length 4 whose annihilator of their maximal ideals...

    C. Álvarez-García, C. A. Castillo-Guillén, Mohamed Badaoui in Applicable Algebra in Engineering, Communication and Computing
    Article 13 July 2024
  7. Intelligent and efficient task caching for mobile edge computing

    Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...

    Amir Moradi, Fatemeh Rezaei in Cluster Computing
    Article 13 July 2024
  8. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  9. Sublinear Algorithms in T-Interval Dynamic Networks

    We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...

    Irvan Jahja, Haifeng Yu in Algorithmica
    Article 12 July 2024
  10. Hierarchical adaptive evolution framework for privacy-preserving data publishing

    The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...

    Mingshan You, Yong-Feng Ge, ... Georgios Kambourakis in World Wide Web
    Article Open access 12 July 2024
  11. M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction

    Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....

    Junyi Tang, Simin An, ... ** Chen in Multimedia Systems
    Article 12 July 2024
  12. An exploratory evaluation of code smell agglomerations

    Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...

    Amanda Santana, Eduardo Figueiredo, ... Alessandro Garcia in Software Quality Journal
    Article 11 July 2024
  13. Global adaptive histogram feature network for automatic segmentation of infection regions in CT images

    Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...

    **nren Min, Yang Liu, ... Mingyang Zhong in Multimedia Systems
    Article 11 July 2024
  14. Unveiling the impact of employee-customer familiarity on customer purchase intentions: an empirical investigation within the realm of web-based date analytics

    This research delves into the intricate dynamics of employee-customer familiarity and its profound influence on customer purchase intentions within...

    Bingfeng Li, **aoting **e, ... Shilei Tan in World Wide Web
    Article 10 July 2024
  15. MIM: A multiple integration model for intrusion detection on imbalanced samples

    The quantity of normal samples is commonly significantly greater than that of malicious samples, resulting in an imbalance in network security data....

    Zhiqiang Zhang, Le Wang, ... Yanchun Zhang in World Wide Web
    Article 10 July 2024
  16. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  17. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  18. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification

    Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....

    Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh in Cluster Computing
    Article 09 July 2024
  19. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
Did you find what you were looking for? Share feedback.