We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Resource allocation for UAV-enabled multi-access edge computing

    In Ultrareliable and Low Latency Communications (URLLC), balancing trade-offs between energy consumption, service availability, and strict...

    Marcos Falcão, Caio Bruno Souza, ... Kelvin Dias in The Journal of Supercomputing
    Article 28 June 2024
  2. Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing

    Driven by the demand for ubiquitous connection in the Internet of everything era, this paper introduces a new low earth orbit (LEO) satellite-based...

    Haoyu Wang, Jianwei An in Computing
    Article 28 November 2023
  3. Resource Allocation Using Deep Deterministic Policy Gradient-Based Federated Learning for Multi-Access Edge Computing

    The study focuses on utilizing the computational resources present in vehicles to enhance the performance of multi-access edge computing (MEC)...

    Zheyu Zhou, Qi Wang, ... Ziyuan Li in Journal of Grid Computing
    Article 27 June 2024
  4. Session-Based Resource Access

    This segment describes how web site keep uses logged in between requests by sending session IDs or access tokens. It also explains the advantages of...
    Video segment 2023
  5. Priority-based concurrency and shared resource access mechanisms for nested intercomponent requests in CAmkES

    Component-based design encapsulates and isolates state and the operations on it, but timing semantics cross-cut these boundaries when a real-time...

    Marion Sudvarg, Zhuoran Sun, ... Ning Zhang in Real-Time Systems
    Article 01 March 2024
  6. Radio Resource Management of WLAN Hotspot Access Points in Next Generation Wireless Networks

    The proliferation of the IEEE wireless local area network (WLAN), due to its flexibility, mobility, and support for billions of smart mobile devices,...

    Michael Adedosu Adelabu, Agbotiname Lucky Imoize, Michael Benjamin Ugwu in SN Computer Science
    Article 08 April 2023
  7. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  8. Resource management and switch migration in SDN-based multi-access edge computing environments

    As the growing of data volumes due to the successive development of new mobile devices and the creation of new applications, the emergence of...

    **g**g Guo, Chunlin Li, Youlong Luo in The Journal of Supercomputing
    Article 19 April 2022
  9. Joint uplink and downlink resource allocation for low-latency mobile virtual reality delivery in fog radio access networks

    Fog radio access networks (F-RANs), in which the fog access points are equipped with communication, caching, and computing functionalities, have been...

    Tian Dang, Chenxi Liu, ... Shi Yan in Frontiers of Information Technology & Electronic Engineering
    Article 01 January 2022
  10. Joint energy and latency-sensitive computation and communication resource allocation for multi-access edge computing in a two-tier 5G HetNet

    Multi-access edge computing (MEC) and heterogeneous networks (HetNets) are two significant separately perceptible but complementary innovations....

    Mobasshir Mahbub, Bobby Barua in International Journal of Information Technology
    Article 02 August 2022
  11. Model division multiple access for semantic communications

    In a multi-user system, system resources should be allocated to different users. In traditional communication systems, system resources generally...

    ** Zhang, **aodong Xu, ... **aofeng Tao in Frontiers of Information Technology & Electronic Engineering
    Article 02 June 2023
  12. User-trust centric lightweight access control for smart IoT crowd sensing applications in healthcare systems

    The Internet of Things (IoT) enables healthcare systems to handle emergencies, where multiple authorities interact to perform tasks. Prevention of...

    Zahid Mahmood, Zeeshan Ashraf, ... Beenish Farooq in Personal and Ubiquitous Computing
    Article 06 May 2024
  13. Access Control and Authorization

    Access control is a process to determine “Who does what to what,” based on a policy. One of the system administrator’s biggest problems, which can...
    Joseph Migga Kizza in Guide to Computer Network Security
    Chapter 2024
  14. MOOCs as a massive learning resource for a Higher Education Community. The Universitat Politècnica de València experience using the EdX remote access program

    During the 2020 COVID-19 lockdown, edX launched an initiative, called the Remote Access Program, to give access to free certificates for its Massive...

    Ignacio Despujol, Linda Castañeda, Carlos Turró in Education and Information Technologies
    Article Open access 20 June 2022
  15. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  16. Resource Allocation in Massive Non-Orthogonal Multiple Access System

    With the popularity of large-scale communication scenarios, massive multiple access technology has attracted academic attention. In this paper, a...
    Wen Zhang, Jie Zeng, Zhong Li in Communications and Networking
    Conference paper 2022
  17. End-to-end slicing of RAN based on next-generation optical access network

    Given their widespread use, optical access networks are suitable as a practical infrastructure for mobile networks and services. The diverse range of...

    Carlo Centofanti, Andrea Marotta, ... Koteswararao Kondepu in Photonic Network Communications
    Article 30 May 2024
  18. Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems

    Mobile edge computing (MEC) reduces the latency for end users to access applications deployed at the edge by offloading tasks to the edge. With the...

    **ao Zheng, Muhammad Tahir, ... Rizwan Ullah in Journal of Cloud Computing
    Article Open access 24 June 2024
  19. Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization

    The exponential growth of Internet of Things (IoT) devices has ushered in an era of vast data generation, necessitating abundant resources for data...

    Kavitha Dhanushkodi, Raushan Kumar, ... Kiruthika Venkataramani in Cluster Computing
    Article 15 June 2024
  20. A heterogeneous graph-based semi-supervised learning framework for access control decision-making

    For modern information systems, robust access control mechanisms are vital in safeguarding data integrity and ensuring the entire system’s security....

    Jiao Yin, Guihong Chen, ... Yuan Miao in World Wide Web
    Article Open access 24 May 2024
Did you find what you were looking for? Share feedback.