Search
Search Results
-
Hierarchical multi-granularity classification based on bidirectional knowledge transfer
Hierarchical multi-granularity classification is the task of classifying objects according to multiple levels or granularities. The class hierarchy...
-
Exploiting beam search confidence for energy-efficient speech recognition
With mobile and embedded devices getting more integrated in our daily lives, the focus is increasingly shifting toward human-friendly interfaces,...
-
Parallel implementation of discrete cosine transform and its inverse for image compression applications
This paper presents the graphics processing unit (GPU) implementation of two-dimensional discrete cosine transform (2D DCT) and inverse discrete...
-
Secure query processing for smart grid data using searchable symmetric encryption
In the last decade, the smart grid has utilized many modern technologies and applications compared with the conventional grid. Cloud computing offers...
-
Lattice-based ring signcryption scheme for smart healthcare management
Conventional signcryption schemes that depend on discrete logarithm problem, big integer prime factorization, and bilinear pairing are at risk in the...
-
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach
Efficient virtual machine (VM) placement is vital for optimizing the performance of cloud data centers. While recent studies have addressed this...
-
Conscious points and patterns extraction: a high-performance computing model for knowledge discovery in cognitive IoT
Incorporating cognition into the design and architecture of the Internet of Things (IoT) has recently been the subject of much research, giving rise...
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
A quantitative analysis of the security of PoW-based blockchains
This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...
-
An empirical study on cross-component dependent changes: A case study on the components of OpenStack
Modern software systems are composed of several loosely coupled components. Typical examples of such systems are plugin-based systems, microservices,...
-
A network intrusion detection system based on deep learning in the IoT
As industrial and everyday devices become increasingly interconnected, the data volume within the Internet of Things (IoT) has experienced a...
-
Intelligent and efficient task caching for mobile edge computing
Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...
-
A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification
IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so...
-
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...
-
Hierarchical adaptive evolution framework for privacy-preserving data publishing
The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...
-
Research on satellite link allocation algorithm for Earth-Moon space information network
With ongoing advancements in space exploration and communication technology, the realization of an Earth-Moon space information network is gradually...
-
M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction
Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....
-
An exploratory evaluation of code smell agglomerations
Code smell is a symptom of decisions about the system design or code that may degrade its modularity. For example, they may indicate inheritance...