Showing 661 - 680 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 661
  2. 662
  3. 663
  4. 664
  5. 665

    Opportunities and Difficulties for Strategic Litigation to Advance Digital Rights in the Internet Audience Economy by Swee Leng Harris

    Published 2024-08-01
    “…Internet tech giants are regulated by multiple overlapping yet distinct pieces of EU legislation that establish a range of substantive digital rights for internet users, and varying legal opportunity structures for strategic litigation within their enforcement architecture. …”
    Get full text
    Article
  6. 666
  7. 667

    S-Vivaldi:a space repairing based Internet delay space embedding algorithm by Zhan-feng WANG, Ming CHEN, Chang-you XING, Hua-li BAI, Xiang-lin WEI

    Published 2012-03-01
    “…To counteract TIV’s influence on the Internet delay space models,an Internet delay space embedding algorithm based space repairing S-Vivaldi (scaling-Vivaldi) was proposed.S-Vivaldi firstly applied an exponent transformation on the delay matrix D,retrieved a matrix D'almost without TIV,and then embedded D'by the Vivaldi algorithm.The delay between any two nodes could be computed by a series of inverse transformation.Experimental results show that S-Vivaldi could improve the prediction accuracy apparently in the most case.…”
    Get full text
    Article
  8. 668
  9. 669
  10. 670

    Recent advances on federated learning systems and the design for computing power Internet of things by LU Jianfeng, QI Pan, PAN Linyu, LI Bing, CAO Shuqin, JIN Yan'an

    Published 2024-12-01
    “…Computing power Internet of things (CPIoT) integrates Internet of things (IoT) devices with substantial computational resources to support data-intensive tasks, facilitating intelligent decision-making. …”
    Get full text
    Article
  11. 671

    Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles by Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE

    Published 2021-06-01
    “…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
    Get full text
    Article
  12. 672
  13. 673
  14. 674
  15. 675

    Internet Addiction Effect on Quality of Life: A Systematic Review and Meta-Analysis by Farzaneh Noroozi, Soheil Hassanipour, Fatemeh Eftekharian, Kumars Eisapareh, Mohammad Hossein Kaveh

    Published 2021-01-01
    “…Due to the use of different methodologies, tools, and measurements, the positive or negative impact of Internet use on human life quality is accompanied by a series of ambiguities and uncertainties. …”
    Get full text
    Article
  16. 676

    Enhanced group communication in constrained application protocol–based Internet-of-things networks by Hyung-Woo Kang, Seok-Joo Koh

    Published 2018-04-01
    “…As a lot of sensors are connected to the Internet, many works have been made to support group communication for constrained application protocol. …”
    Get full text
    Article
  17. 677
  18. 678
  19. 679

    V-BAG: A virtual bandwidth aggregation scheme for Internet of Things data by Yongsu Gwak, Young Yong Kim, Ronny Yongho Kim

    Published 2017-04-01
    “…In order to meet the two crucial requirements of Internet of Things (support of a large number of Internet of Things devices and low power consumption), this article proposes a novel and efficient virtual bandwidth aggregation scheme for Internet of Things data. …”
    Get full text
    Article
  20. 680

    Developing an On-Demand Cloud-Based Sensing-as-a-Service System for Internet of Things by Mihui Kim, Mihir Asthana, Siddhartha Bhargava, Kartik Krishnan Iyyer, Rohan Tangadpalliwar, Jerry Gao

    Published 2016-01-01
    “…The increasing number of Internet of Things (IoT) devices with various sensors has resulted in a focus on Cloud-based sensing-as-a-service (CSaaS) as a new value-added service, for example, providing temperature-sensing data via a cloud computing system. …”
    Get full text
    Article