|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Irina Kochetkova, Anna Kushchazli, Sofia Burtseva and Andrey Gorshenin
Fifth-generation (5G) networks require efficient radio resource management (RRM) which should dynamically adapt to the current network load and user needs. Monitoring and forecasting network performance requirements and metrics helps with this task. One ...
ver más
|
|
|
|
|
|
|
Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Linda Karina Toscano-Medina, Hector Manuel Perez-Meana, Jose Portillo-Portillo and Jesus Olivares-Mercado
The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual property ri...
ver más
|
|
|
|
|
|
|
Zhiyuan Wang, Hong Ni and Rui Han
As the Internet communication model changes from host-centric to content-centric, information-centric networking (ICN) as a new network architecture has received increasing attention. There are often multiple replicas of content in ICN, and how to reason...
ver más
|
|
|
|
|
|
|
Xinrui Zheng and Mamoru Amemiya
Street greenness visibility (SGV) is associated with various health benefits and positively influences perceptions of landscape. Lowering the barriers to SGV assessments and measuring the values accurately is crucial for applying this critical landscape ...
ver más
|
|
|
|
|
|
|
Fernando Mendonça, Flávio Martins and João Janeiro
This paper presents the Simulation Management System for Operational Coastal Hydrodynamic Models, or SMS-Coastal, and its novel methodology designed to automate forecast simulations of coastal models. Its working principle features a generic framework th...
ver más
|
|
|
|
|
|
|
Gerardo Hernández-Oregón, Mario E. Rivero-Angeles, Juan C. Chimal-Eguía and Jorge E. Coyac-Torres
Peer-to-Peer (P2P) networks have emerged as potential solutions to issues that cause inefficient download times in networks because they can use the resources in the entire network, allowing nodes to act both as servers and clients simultaneously. Common...
ver más
|
|
|
|
|
|
|
Saida Mussakhojayeva, Kaisar Dauletbek, Rustem Yeshpanov and Huseyin Atakan Varol
The primary aim of this study was to contribute to the development of multilingual automatic speech recognition for lower-resourced Turkic languages. Ten languages?Azerbaijani, Bashkir, Chuvash, Kazakh, Kyrgyz, Sakha, Tatar, Turkish, Uyghur, and Uzbek?we...
ver más
|
|
|
|
|
|
|
Turki Turki, Sanjiban Sekhar Roy and Y.-H. Taguchi
It is difficult to identify histone modification from datasets that contain high-throughput sequencing data. Although multiple methods have been developed to identify histone modification, most of these methods are not specific to histone modification bu...
ver más
|
|
|
|
|
|
|
Marc Löchner and Dirk Burghardt
Social media data are widely used to gain insights about social incidents, whether on a local or global scale. Within the process of analyzing and evaluating the data, it is common practice to download and store it locally. Considerations about privacy p...
ver más
|
|
|
|