„Operating Systems.“
Suchergebnisse
10.000+ Treffer
-
EPAD: empowering privacy-preserving anomaly detection through homomorphic encryption and machine learning
-
A renewable energy-based virtual machine placement algorithm for managing energy and carbon in geographically distributed datacenters
-
Controller placement in software-defined networks using reinforcement learning and metaheuristics
-
CMFuse: a hierarchical feature fusion model combining convolution and Mamba for medical image classification
-
Enhancing intrusion detection: protocol-based security using a hybrid RIDGE classifier on InSDN, UNSW-NB15, BoT-IoT, and ToN-IoT datasets
-
BOTSIAM-DRL-Botnet detection using a few shot active matching siamese network deep reinforcement learning in IoT networks
-
A diversity-enhanced framework for multimodal optimization: utilizating niching and differential evolution operator
-
Iforestexplain: a dual-stage isolation forest framework with explainable AI for DoS/DDoS anomaly detection in IoT networks
-
Adaptive partitioning of DNNs for resource-efficient inference on edge clusters
-
A modified RIME algorithm with covariance learning and diversity enhancement for numerical optimization
-
A novel multi-objective optimization- XGBoost based feature selection and optimization for enhanced phishing website detection
-
GTVD: a multi-level aggregation vulnerability detection method based on full-dependency program graph
-
An organizational framework for multiple monitoring tools to improve the correctness of high performance computing datasets
-
SIMPLO: a reinforcement learning-based long-running container scheduling algorithm with interference awareness for performance and power efficiency optimization
-
Pvre: privacy-preserving and verifiable reputation evaluation scheme for VANETs
-
Quantum, post-quantum, and blockchain approaches for securing the internet of medical things: a systematic review
-
A multi-strategy improved gazelle optimization algorithm for solving numerical optimization and engineering applications
-
Midframe-centric token merging for efficient video transformer
-
A hybrid intrusion detection system model integrated explainable AI and multi expert systems to adapt edge computing
-
Pre-trained representation and negative sampling-based service recommendation