Showing 4,961 - 4,980 results of 9,922 for search 'open computing', query time: 0.16s Refine Results
  1. 4961

    Autoregressive integrated moving average model–based secure data aggregation for wireless sensor networks by Hongtao Song, Shanshan Sui, Qilong Han, Hui Zhang, Zaiqiang Yang

    Published 2020-03-01
    “…Nodes in a wireless sensor network are normally constrained by hardware and environmental conditions and face challenges of reduced computing capabilities and system security vulnerabilities. …”
    Get full text
    Article
  2. 4962

    Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions by Razi Iqbal, Talal Ashraf Butt, Muhammad Afzaal, Khaled Salah

    Published 2019-01-01
    “…This constant connectivity opens new avenues for novel applications such as the realization of social Internet of things and its subdomain the social Internet of vehicles. …”
    Get full text
    Article
  3. 4963
  4. 4964
  5. 4965
  6. 4966

    Automated segmentation of synchrotron-scanned fossils by Melanie A. D. During, Jordan K. Matelsky, Fredrik K. Gustafsson, Dennis F. A. E. Voeten, Donglei Chen, Brock A. Wester, Konrad P. Kording, Per E. Ahlberg, Thomas B. Schön

    Published 2025-03-01
    “…Computed tomography has revolutionised the study of the internal three-dimensional structure of fossils. …”
    Get full text
    Article
  7. 4967

    Artificial Intelligence and Moral intelligence by Laura Pana

    Published 2008-07-01
    “…We present intelligence as a system with an internal structure and the structural levels of the moral system, as well as certain characteristics of artificial intelligent agents which can/must be treated as 1- individual entities (with a complex, specialized, autonomous or selfdetermined, even unpredictable conduct), 2- entities endowed with diverse or even multiple intelligence forms, like moral intelligence, 3- open and, even, free-conduct performing systems (with specific, flexible and heuristic mechanisms and procedures of decision), 4 – systems which are open to education, not just to instruction, 5- entities with “lifegraphy”, not just “stategraphy”, 6- equipped not just with automatisms but with beliefs (cognitive and affective complexes), 7- capable even of reflection (“moral life” is a form of spiritual, not just of conscious activity), 8 – elements/members of some real (corporal or virtual) community, 9 – cultural beings: free conduct gives cultural value to the action of a ”natural” or artificial being. …”
    Get full text
    Article
  8. 4968
  9. 4969
  10. 4970
  11. 4971

    Digital Twin-Aided Municipal Traffic Control by Reeti Pradhananga, Shelby Williams, Sercan Aygun, Li Chen, Yazhou Tu, Whitney Crow, Sathyanarayanan Aakur, Nian-Feng Tzeng

    Published 2025-07-01
    “…Swift advances in computing and artificial intelligence (AI) technologies of late have prompted the increasing applications of digital twins (DiTs) to various sectors for boosting effectiveness and productivity. …”
    Get full text
    Article
  12. 4972
  13. 4973
  14. 4974

    A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey by Teodora Vasilas, Remus Brad

    Published 2025-01-01
    “…Finally, we discuss emerging trends in attack techniques and countermeasures, highlighting open challenges and future research directions to secure modern computing systems.…”
    Get full text
    Article
  15. 4975

    Task scheduling optimization strategy for roadside unit based on security strength by SU Beipo, DAI Liang, JU Yongfeng

    Published 2024-04-01
    “…In the context of cooperative vehicle-infrastructure systems (CVIS), vehicles often offload computational tasks to roadside units (RSUs) for execution due to their own constrained computing resources. …”
    Get full text
    Article
  16. 4976
  17. 4977

    Electronic Logbook System by Dmitrii Shpotya, Nikita Balashov

    Published 2024-03-01
    “…Modern scientific research, conducted on technically complex facilities, often requires auxiliary information and computing systems to support effective resolution of research tasks. …”
    Get full text
    Article
  18. 4978
  19. 4979
  20. 4980

    A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication by Yunlong Wang, Jie Zhang, Guangjie Han, Dugui Chen

    Published 2025-05-01
    “…Cooperative Unmanned Aerial Vehicle (UAV) technology can significantly improve data acquisition in Internet of Things (IoT) environments, which are characterized by wide distribution and limited capacity of ground-based devices. However, due to the open nature of wireless communications, such applications face security threats posed by UAV authentication, especially in scalable IoT environments. …”
    Get full text
    Article