Found: 27
Select item for more details and to access through your institution.
SVM‐SFL based malicious UAV detection in wireless sensor networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8049
- By:
- Publication type:
- Article
Network partition detection and recovery with the integration of unmanned aerial vehicle.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8048
- By:
- Publication type:
- Article
Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8044
- By:
- Publication type:
- Article
Deep code search efficiency based on clustering.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8027
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.7790
- Publication type:
- Article
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8089
- By:
- Publication type:
- Article
An autonomous blockchain‐based computational broker for e‐science.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8087
- By:
- Publication type:
- Article
Privacy preserving and secure robust federated learning: A survey.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8084
- By:
- Publication type:
- Article
Energy‐efficient reliability‐aware offloading for delay‐sensitive tasks in collaborative edge computing.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8083
- By:
- Publication type:
- Article
Fault‐tolerance approaches for distributed and cloud computing environments: A systematic review, taxonomy and future directions.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8081
- By:
- Publication type:
- Article
EPREKM: ElGamal proxy re‐encryption‐based key management scheme with constant rekeying cost and linear public bulletin size.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8078
- By:
- Publication type:
- Article
Sampling business process event logs with guarantees.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8077
- By:
- Publication type:
- Article
ADSBAN: Anomaly detection system for body area networks utilizing IoT and machine learning.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8075
- By:
- Publication type:
- Article
Toward social media forensics through development of iOS analyzers for evidence collection and analysis.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8074
- By:
- Publication type:
- Article
Corrigendum.
- Published in:
- 2024
- Publication type:
- Correction Notice
TDLC: Tensor decomposition‐based direct learning‐compression algorithm for DNN model compression.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8072
- By:
- Publication type:
- Article
Blockchain assisted blind signature algorithm with data integrity verification scheme.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8071
- By:
- Publication type:
- Article
Early experiences on the OLCF Frontier system with AthenaPK and Parthenon‐Hydro.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8069
- By:
- Publication type:
- Article
Transforming data‐intensive workflows: A cutting‐edge multi‐layer security and quality aware security framework.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8068
- By:
- Publication type:
- Article
An optimized crypto‐based routing protocol for secure routing in wireless sensor networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8067
- By:
- Publication type:
- Article
Multi objective optimization scheduling of unmanned warehouse handling robots based on A star algorithm.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8064
- By:
- Publication type:
- Article
Cross‐network service recommendation in smart cities.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8063
- By:
- Publication type:
- Article
A spatio‐temporal graph convolutional approach to real‐time load forecasting in an edge‐enabled distributed Internet of Smart Grids energy system.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8060
- By:
- Publication type:
- Article
BLOCKBOX: Blockchain based black box designing and modeling.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8057
- By:
- Publication type:
- Article
AMter: An end‐to‐end model for transcriptional terminators prediction by extracting semantic feature automatically based on attention mechanism.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8056
- By:
- Publication type:
- Article
A deep learning model of dance generation for young children based on music rhythm and beat.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8053
- By:
- Publication type:
- Article
Computation offloading techniques in edge computing: A systematic review based on energy, QoS and authentication.
- Published in:
- Concurrency & Computation: Practice & Experience, 2024, v. 36, n. 13, p. 1, doi. 10.1002/cpe.8050
- By:
- Publication type:
- Article