10   Artículos

 
en línea
Yongli Tang, Deng Pan, Panke Qin and Liping Lv    
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
R.A. Elchenkov,M.E. Dunaev,K.S. Zaytsev     Pág. 62 - 69
The purpose of this work is to study methods for predicting the values of time series when processing streaming data in distributed systems in real time. To do this, the authors propose a modification of the autoregressive model with a given AR order by ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Abidemi Emmanuel Adeniyi, Sanjay Misra, Eniola Daniel and Anthony Bokolo, Jr.    
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealin... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hollie L. Tripp, Justin C. Strickland, Melissa Mercincavage, Janet Audrain-McGovern, Eric C. Donny and Andrew A. Strasser    
Current text-only cigarette warning labels (long-term, loss-framed messages) may not motivate positive changes in smoking behavior. The current project was a cross-sectional study examining the effects of tailored cigarette warnings on perceived message ... ver más

 
en línea
El Miloud Ar-Reyouchi,Yousra Lamrani,Imane Benchaib,Kamal Ghoumid,Salma Rattal     Pág. pp. 61 - 75
Computing and measuring the total capacity of a data network are a remarkably difficult problem. These metrics are directly linked to the available bandwidth to each wireless internet of things (IoT) device of the network.  In this paper, the author... ver más

« Anterior     Página: 1 de 1     Siguiente »