We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 1,345 results
  1. Separating Separation Logic – Modular Verification of Red-Black Trees

    Interactive theorem provers typically use abstract algebraic data structures to focus on algorithmic correctness. Verification of programs in real...
    Gerhard Schellhorn, Stefan Bodenmüller, ... Wolfgang Reif in Verified Software. Theories, Tools and Experiments.
    Conference paper 2023
  2. Aggressive GPU cache bypassing with monolithic 3D-based NoC

    Cache bypassing is widely employed to alleviate cache contention and pollution in GPUs. However, cache bypassing often puts more pressure on the...

    Cong Thuan Do, Cheol Hong Kim, Sung Woo Chung in The Journal of Supercomputing
    Article 21 October 2022
  3. A Survey on Clock Synchronization in the Industrial Internet

    Clock synchronization is one of the most fundamental and crucial network communication strategies. With the expansion of the Industrial Internet in...

    Fan Dang, **-Kai Sun, ... Yun-Hao Liu in Journal of Computer Science and Technology
    Article 31 January 2023
  4. Deep Reinforcement Learning for Jointly Resource Allocation and Trajectory Planning in UAV-Assisted Networks

    Unmanned aerial vehicles (UAVs) have diverse applications in various fields, including the deployment of drones in 5G mobile networks and upcoming 6G...
    Arwa Mahmoud Jwaifel, Tien Van Do in Computational Collective Intelligence
    Conference paper 2023
  5. Model-Free Predictor of Signal-to-Noise Ratios for Mobile Communications Systems

    This paper presents a model-free predictor applied to forecast values of signal-to-noise ratio (SNR) relation in wireless communication networks. The...

    Márcio José Teixeira, Varese Salvador Timóteo in SN Computer Science
    Article 21 April 2023
  6. Technologies for design-build-test-learn automation and computational modelling across the synthetic biology workflow: a review

    Motivated by the need to parameterize and functionalize dynamic, multiscale simulations, as well as bridge the gap between advancing in silico and...

    Article Open access 03 May 2024
  7. Throughput, capacity and latency analysis of P-NOMA RRM schemes in 5G URLLC

    5G is expected to cover a wide range of potential use cases due to its flexible and configurable physical layer waveform. One of the use cases...

    Eneko Iradier, Aritz Abuin, ... Pablo Angueira in Multimedia Tools and Applications
    Article 31 May 2021
  8. AI Cybersecurity Assurance for Autonomous Transport Systems: Scenario, Model, and IMECA-Based Analysis

    The paper investigates problems and ways of utilizing Artificial Intelligence (AI) to ensure the cybersecurity of autonomous transport systems (ATSs)...
    Vyacheslav Kharchenko, Oleg Illiashenko, ... Ievgen Babeshko in Multimedia Communications, Services and Security
    Conference paper 2022
  9. Energy-efficient UAV-NOMA aided wireless coverage with massive connections

    In this paper, we propose an unmanned aerial vehicle (UAV)-assisted wireless coverage scheme, wherein UAVs help to serve the cell-edge users for...

    Yuqiao Tong, Min Sheng, ... Nan Zhao in Science China Information Sciences
    Article 01 November 2023
  10. An Improved Machine Learning Approach for Throughput Prediction in the Next Generation Wireless Networks

    Currently evolving 5G telecom networks require different intelligent learning and decision mechanisms to adapt to the varying network conditions....
    Conference paper 2024
  11. BNPSIW: BRBS-based NSST-PZMs domain statistical image watermarking

    Robustness, imperceptibility, and watermark capacity are three indispensable and contradictory properties for any image watermarking systems. It is a...

    Panpan Niu, Yinghong He, ... **angyang Wang in Pattern Analysis and Applications
    Article 13 May 2024
  12. Video object segmentation for automatic image annotation of ethernet connectors with environment map** and 3D projection

    The creation of a dataset is time-consuming and sometimes discourages researchers from pursuing their goals. To overcome this problem, we present and...

    Marrone Danta, Pedro Dreyer, ... Djamel Sadok in Multimedia Tools and Applications
    Article 04 May 2022
  13. Deep Reinforcement Learning-Based Resource Allocation for 5G Machine-Type Communication in Active Distribution Networks

    With the development of smart grids and active distribution networks (ADNs), reliable and low-latency communication is the key to advanced...
    Qiyue Li, Hong Cheng, ... Wei Sun in Mobile Networks and Management
    Conference paper 2022
  14. RCBE-AS: Rabin cryptosystem–based efficient authentication scheme for wireless sensor networks

    Wirelesssensor networks (WSNs) are applicable in numerous fields ranging from very common to those demanding critical security concerns. It is...

    Deepti Singh, Bijendra Kumar, ... Pradeep Kumar Singh in Personal and Ubiquitous Computing
    Article 16 July 2021
  15. D2D NOMA Groupcast in 5G Heterogeneous Networks

    In traditional 5G latency-driven assignment methodologies, a radio carrier’s numerology is typically fixed for any given QoS flow, as directed by the...

    Rafael Kaliski in SN Computer Science
    Article 17 July 2021
  16. The Bike Sharing Problem

    Assume that \(m \ge 1\) autonomous...
    Jurek Czyzowicz, Konstantinos Georgiou, ... Denis Pankratov in WALCOM: Algorithms and Computation
    Conference paper 2021
  17. Construction Risk Monitoring Method of Subway Foundation Pit Engineering Based on Simulated Annealing Neural Network

    Traditional subway foundation pit engineering construction risk monitoring methods have slow convergence speed when solving large-scale practical...
    Tengfei Ma, Mingxian Zhang, ... Yi Zhang in Advanced Hybrid Information Processing
    Conference paper 2023
  18. Performance evaluation and downstream system planning based energy management in LTE systems

    The Mobile Edge Computing is a novel prototype that was developed recently due to the benefits and expanding nature of electronic data-processing...

    Saumen Dhara, Soumya Das, Alok Kumar Shrivastav in Multimedia Tools and Applications
    Article 10 May 2023
  19. Codescape - Development and Operation of a Serious Game for Teaching Programming in Introductory Courses

    The serious game Codescape is developed at the RWTH University and used in several introductory programming courses with a total of 3000 students per...
    Paul Gamper, Ulrik Schroeder in Serious Games
    Conference paper 2023
  20. Spectrum Sensing and Prediction for 5G Radio

    In future wireless networks, it is crucial to find a way to precisely evaluate the degree of spectrum occupation and the exact parameters of free...
    Małgorzata Wasilewska, Hanna Bogucka, Adrian Kliks in Big Data Technologies and Applications
    Conference paper 2021
Did you find what you were looking for? Share feedback.