|
|
|
Eleni Vlachou, Aristeidis Karras, Christos Karras, Leonidas Theodorakopoulos, Constantinos Halkiopoulos and Spyros Sioutas
In this work, we present a Distributed Bayesian Inference Classifier for Large-Scale Systems, where we assess its performance and scalability on distributed environments such as PySpark. The presented classifier consistently showcases efficient inference...
ver más
|
|
|
|
|
|
|
Fan Huang , Nan Yang, Huaming Chen , Wei Bao and Dong Yuan
With the widespread use of end devices, online multi-label learning has become popular as the data generated by users using the Internet of Things devices have become huge and rapidly updated. However, in many scenarios, the user data are often generated...
ver más
|
|
|
|
|
|
|
Samuel Molcan, Monika Smie?ková, Hynek Bachratý, Katarína Bachratá and Peter Novotný
The elasticity of red blood cells (RBCs) plays a vital role in their efficient movement through blood vessels, facilitating the transportation of oxygen within the bloodstream. However, various diseases significantly impact RBC elasticity, making it an i...
ver más
|
|
|
|
|
|
|
Evangelos D. Spyrou, Ioannis Tsoulos and Chrysostomos Stylios
Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial...
ver más
|
|
|
|
|
|
|
Riccardo Lazzarini, Huaglory Tianfield and Vassilis Charissis
The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems (IDS...
ver más
|
|
|
|
|
|
|
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p...
ver más
|
|
|
|
|
|
|
Junwei Lang, Zhenjia Zeng, Tengfei Ma and Sailing He
Sudden air pollution accidents (explosions, fires, leaks, etc.) in chemical industry parks may result in great harm to people?s lives, property, and the ecological environment. A gas tracking network can monitor hazardous gas diffusion using traceability...
ver más
|
|
|
|
|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Sean Grimes and David E. Breen
Wisdom-of-Crowds-Bots (WoC-Bots) are simple, modular agents working together in a multi-agent environment to collectively make binary predictions. The agents represent a knowledge-diverse crowd, with each agent trained on a subset of available informatio...
ver más
|
|
|
|
|
|
|
Lorenzo Ridolfi, David Naseh, Swapnil Sadashiv Shinde and Daniele Tarchi
With the advent of 6G technology, the proliferation of interconnected devices necessitates a robust, fully connected intelligence network. Federated Learning (FL) stands as a key distributed learning technique, showing promise in recent advancements. How...
ver más
|
|
|
|