We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 172 results
  1. An SDN-Based Dynamic Security Architecture for Space Information Networks

    In the near future, the Space Information Network (SIN) will evolve into Space-earth Integrated Network, which will realize the interconnection among...
    Ziqi Wang, Baojiang Cui, ... Meiyi Jiang in Space Information Networks
    Conference paper 2020
  2. Evolutionary exploration and comparative analysis of the research topic networks in information disciplines

    “Information Science and Library Science” (LIS) and “Computer Science” (CS) are two information-related disciplines with similar academic context and...

    **aoguang Wang, Hongyu Wang, Han Huang in Scientometrics
    Article 26 April 2021
  3. A multi-layer trust-based middleware framework for handling interoperability issues in heterogeneous IOTs

    Traditional wireless technologies have evolutionary converged to Internet of Thing (IoT) for devices and service interactions. In the past decade,...

    Mohammad Asad Abbasi, Zulfiqar A. Memon, ... Ghulam Ali Mallah in Cluster Computing
    Article 20 February 2021
  4. XRL-SHAP-Cache: an explainable reinforcement learning approach for intelligent edge service caching in content delivery networks

    Content delivery networks (CDNs) play a pivotal role in the modern internet infrastructure by enabling efficient content delivery across diverse...

    **aolong Xu, Fan Wu, ... Weiyi Zhong in Science China Information Sciences
    Article 27 June 2024
  5. A multi-dimensional extensible cloud-native service stack for enterprises

    With the widespread acceptance of the cloud-native concept and the emergence of a large number of dedicated cloud-native applications, the service...

    Jian Lin, Dongming **e, ... Long Ye in Journal of Cloud Computing
    Article Open access 24 November 2022
  6. An overview of cryptographic primitives for possible use in 5G and beyond

    This survey overviews the potential use of cryptographic primitives in the fifth-generation mobile communications system (aka 5G) and beyond. It...

    **g Yang, Thomas Johansson in Science China Information Sciences
    Article Open access 11 November 2020
  7. Foundation and Cost of Mimic Defense

    As pointed out in the previous chapter, the mimic defense is essentially an endogenous security effect formed by the combination of the generalized...
    Jiangxing Wu in Cyberspace Mimic Defense
    Chapter 2020
  8. An insight into smartphone-based assistive solutions for visually impaired and blind people: issues, challenges and opportunities

    Blind people are confronting a number of challenges in performing activities of daily life such as reading labels on a product, identification of...

    Article 04 July 2020
  9. A deep reinforcement learning approach for dynamic task scheduling of flight tests

    For flight test engineering, the flight test task schedule is of great importance to the delivery node and the development cost of an aircraft, while...

    Bei Tian, Gang **ao, Yu Shen in The Journal of Supercomputing
    Article 22 May 2024
  10. Multimedia Over Wireless and Mobile Networks

    The rapid developments in computer and communication technologies have made ubiquitous computing a reality. From cordless phones in the early days to...
    Ze-Nian Li, Mark S. Drew, Jiangchuan Liu in Fundamentals of Multimedia
    Chapter 2021
  11. Out-of-the-box parameter control for evolutionary and swarm-based algorithms with distributed reinforcement learning

    Parameter control methods for metaheuristics with reinforcement learning put forward so far usually present the following shortcomings: (1) Their...

    Marcelo Gomes Pereira de Lacerda, Fernando Buarque de Lima Neto, ... Herbert Kuchen in Swarm Intelligence
    Article 07 January 2023
  12. Architecture and System of E-Commerce

    In 1998, Liu Qiangdong founded **gdong in Zhongguancun, and **gdong’s trading model at that time was offline. Later, Liu realized the development...
    Zheng Qin, Qinghong Shuai, ... Mingshi Chen in E-Commerce
    Chapter 2022
  13. Mobile Edge Computing for the Internet of Vehicles

    The advancement of cyber physical information has led to the pervasive use of smart vehicles while enabling various types of powerful mobile...
    Yan Zhang in Mobile Edge Computing
    Chapter Open access 2022
  14. Differential evolution and particle swarm optimization against COVID-19

    COVID-19 disease, which highly affected global life in 2020, led to a rapid scientific response. Versatile optimization methods found their...

    Adam P. Piotrowski, Agnieszka E. Piotrowska in Artificial Intelligence Review
    Article Open access 19 August 2021
  15. Engineering and Implementation of Mimic Defense

    In Chap. 9 , we described the basic principles of mimic defense. In this chapter, we will focus on the basic conditions and constraints for mimic...
    Jiangxing Wu in Cyberspace Mimic Defense
    Chapter 2020
  16. Information-Centric Networking Routing Challenges and Bio/ACO-Inspired Solution: A Review

    Information-Centric Networking (ICN) aims to distribute and retrieve the content by name. In this paper, we review and approve the feasible Ant...
    Qingyi Zhang, **ngwei Wang, ... Jianhui Lv in Advances in Swarm Intelligence
    Conference paper 2018
  17. AI Alignment of Disaster Resilience Management Support Systems

    This paper presents an application of Artificial Intelligence (AI) prospective studies to determine the most suitable AI technologies for...
    Andrzej M. J. Skulimowski, Victor A. Bañuls in Artificial Intelligence and Soft Computing
    Conference paper 2021
  18. Attention, please! A survey of neural attention models in deep learning

    In humans, Attention is a core property of all perceptual and cognitive operations. Given our limited ability to process competing sources, attention...

    Alana de Santana Correia, Esther Luna Colombini in Artificial Intelligence Review
    Article 03 March 2022
  19. MQTT Protocol Use Cases in the Internet of Things

    In the imminent generations, the Internet of Things (IoT) will have a vital role in ‘Networking’. There are a lot of subscribing/publish protocols...
    D. Shanmugapriya, Akshet Patel, ... Jerry Chun-Wei Lin in Big Data Analytics
    Conference paper 2021
  20. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts

    The fifth generation (5G) wireless communication networks are being deployed worldwide from 2020 and more capabilities are in the process of being...

    **aohu You, Cheng-**ang Wang, ... Ying-Chang Liang in Science China Information Sciences
    Article Open access 24 November 2020
Did you find what you were looking for? Share feedback.