Search
Search Results
-
European Digital Sovereignty: A Layered Approach
The paper uses a stack model to come to an estimation of the EU's digital capacities on the global stage. Digital capacities are hard to measure and...
-
Expected scalarised returns dominance: a new solution concept for multi-objective decision making
In many real-world scenarios, the utility of a user is derived from a single execution of a policy. In this case, to apply multi-objective...
-
A Review of Policy on Creative Industry for Sustainable Nation: A Malaysian Perspective
The Malaysian Dasar Industri Kreatif Negara (DIKN), or the Malaysian National Creative Industry Policies, was launched in 2010 and created a list of... -
Polisma - A Framework for Learning Attribute-Based Access Control Policies
Attribute-based access control (ABAC) is being widely adopted due to its flexibility and universality in capturing authorizations in terms of the... -
Multi-view and multi-augmentation for self-supervised visual representation learning
In the real world, the appearance of identical objects depends on factors as varied as resolution, angle, illumination conditions, and viewing...
-
Difference rewards policy gradients
Policy gradient methods have become one of the most popular classes of algorithms for multi-agent reinforcement learning. A key challenge, however,...
-
AutoQNN: An End-to-End Framework for Automatically Quantizing Neural Networks
Exploring the expected quantizing scheme with suitable mixed-precision policy is the key to compress deep neural networks (DNNs) in high efficiency...
-
Scheduling of Elastic Message Passing Applications on HPC Systems
Elastic parallel applications that can change the number of processors while being executed promise improved application and system performance,... -
Short attribute-based signatures for arbitrary Turing machines from standard assumptions
This paper presents the first attribute-based signature (
ABS ) scheme supporting signing policies representable by Turing machines (TM ), based on well-s... -
A big data study of language use and impact in radio broadcasting in China
Broadcasting more educating and language-reviving contents are ways radio stations can help revitalize the use of the English language in the Hunan...
-
Flexible Runtime Security Enforcement with Tagged C
We introduce Tagged C, a novel C variant with built-in tag-based reference monitoring that can be enforced by hardware mechanisms such as the PIPE... -
Simulation Model to Assess Household Water Saving Devices in Bogota City
This paper examines the Bogotá River basin in the Andes of Colombia, which is in a vulnerable state. In the medium term, it would be difficult to... -
The integration of digital games in elementary schools: The principals’ point of view
The goal of the current study was to examine the perceptions of elementary school principals regarding the value of integrating digital games in...
-
Research on the Blockchain Technology Diffusion in China’s Supply-Chain Finance Industry
The high level of risk in supply-chain finance can be overcome by the technical features of blockchain. To smooth the promotion and application of... -
Credit assignment in heterogeneous multi-agent reinforcement learning for fully cooperative tasks
Credit assignment poses a significant challenge in heterogeneous multi-agent reinforcement learning (MARL) when tackling fully cooperative tasks....
-
Forecasting Model for the Number of Breeding Sows Based on Pig’s Months of Age Transfer and Improved Flower Pollination Algorithm-Back Propagation Neural Network
Regulating the number of breeding sows (NBS) is crucial for pork supply–demand balance. Current forecasting methods for NBS fail to consider the...
-
AGRCNet: communicate by attentional graph relations in multi-agent reinforcement learning for traffic signal control
Traffic signal control (TSC) can be described as a multi-agent cooperative game. To realize cooperation, multi-agent reinforcement learning (MARL) is...
-
Modeling and simulation of smart grid-aware edge computing federations
Compute-intensive Internet of Things (IoTs) applications have led to the edge computing paradigm. Edge computing decentralizes the IT infrastructure...
-
Technological Citizenship in Times of Digitization: An Integrative Framework
This article introduces an integrative framework for technological citizenship, examining the impact of digitization and the active roles of citizens...
-
The rise of “security and privacy”: bibliometric analysis of computer privacy research
The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...