Suggested Topics within your search.
Suggested Topics within your search.
- Management 5
- Data processing 4
- Information technology 3
- Moral and ethical aspects 3
- Anesthetics 2
- Cloud computing 2
- Computer networks 2
- Computer security 2
- Data protection 2
- Handbooks, manuals, etc 2
- Visual communication 2
- computer 2
- Agriculture 1
- Anesthesia 1
- Anesthesiology 1
- Anxiety Disorders 1
- Bildanalyse 1
- Bildwissenschaft 1
- Bioinformatics 1
- Business 1
- Business intelligence 1
- COMPUTERS / Internet / General 1
- COMPUTERS / Security / General 1
- Certification 1
- Children 1
- Civil rights 1
- Cognitive Therapy 1
- Communication 1
- Computer programs 1
- Computer scheduling 1
-
661
Composite Tor traffic features extraction method of webpage in actual network flow based on SDN
Published 2022-03-01“…Website fingerprinting (WF) methods for Tor webpage traffic are often based on the separated Tor traffic or even the separated Tor webpage traffic.However, distinguishing Tor traffic from the original traffic of the actual network and Tor webpage traffic from the Tor traffic costs amount of computation, which is more difficult than the WF attack itself.According to the current architecture of the Internet and the characteristics of network traffic converging to regional central nodes, the bi-directional statistical feature (BSF) was proposed for distinguishing Tor traffic through the intra-domain global perspective provided by the SDN structure of the central node and the node information disclosed by the Tor network.Furthermore, a hidden feature extraction method for Web traffic based on lifted structure fingerprinting (LSF) was proposed, and a composited Tor-webpage-identification traffic feature (CTTF) was proposed based on BSF and LSF deep features.For solving the problem of traffic training data scarcity, a traffic data augmentation method based on translation was proposed, which made the augmented traffic data as consistent as the Tor traffic data captured in the real working environment.The experimental results show that the identification rate based on CTTF can be improved by about 4% compared with using only the original data features.When there is less training data, the classification accuracy is improved more obvious after using the traffic data augmentation method, and the false positive rate can be effectively reduced.…”
Get full text
Article -
662
Usable observations over Europe: evaluation of compositing windows for Landsat and Sentinel-2 time series
Published 2024-12-01“…We considered separate and joint use of both data archives and analyzed the spatio-temporal availability of composites during each calendar year and pixel-specific growing season across a variety of time windows and hypothesizing data interpolation. …”
Get full text
Article -
663
Explainable machine learning and feature engineering applied to nanoindentation data
Published 2025-05-01Get full text
Article -
664
Robust biochar yield and composition prediction via uncertainty-aware ResNet-based autoencoder
Published 2025-03-01“…This paper presents a ResNet-based autoencoder model that utilizes biomass properties and pyrolysis conditions to more accurately and robustly predict biochar yield and composition. The developed model has the advantage of addressing the common data uncertainty concerns in training data. …”
Get full text
Article -
665
Energy Efficient Indivisible Workload Distribution in Geographically Distributed Data Centers
Published 2019-01-01Subjects: “…Energy efficiency in cloud computing…”
Get full text
Article -
666
Transformation-Based Data Synthesis for Limited Sample Scenario
Published 2024-01-01Get full text
Article -
667
Data center virtualization and its economic implications for the companies
Published 2009-05-01Subjects: “…data centre…”
Get full text
Article -
668
Use of Data Mining for Intelligent Evaluation of Imputation Methods
Published 2025-06-01Subjects: “…computer science…”
Get full text
Article -
669
Detection and analysis of energy data by using quantum filter
Published 2017-05-01Get full text
Article -
670
An edge streaming data processing framework for autonomous driving
Published 2021-04-01Subjects: “…edge computing…”
Get full text
Article -
671
Detection and analysis of energy data by using quantum filter
Published 2017-05-01Get full text
Article -
672
The Formation of Artificial Data based on a Conveyor Enterprise
Published 2025-08-01Subjects: “…data generation…”
Get full text
Article -
673
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: “…cloud computing;cloud storage;cloud security;data possession provability…”
Get full text
Article -
674
Associations between 24-hour movement compositions and cardiometabolic health in children and adolescents: a five-part compositional analysis using data from the International Children’s Accelerometery Database (ICAD)
Published 2025-06-01“…The aim of this study was to determine the joint influence of SED, light-, moderate- and vigorous-intensity PA (LPA, MPA and VPA), and sleep on CMR factors using five-part compositional analyses.Methods Data were pooled from 16 cohort studies comprising 22 474 children and adolescents from the International Children’s Accelerometery Database. …”
Get full text
Article -
675
SOT-MRAM-based true in-memory computing architecture for approximate multiplication
Published 2025-06-01Subjects: Get full text
Article -
676
Big data security features and operation practices
Published 2021-05-01Subjects: “…big data;data security;blockchain;federated learning;artificial intelligence;cloud computing…”
Get full text
Article -
677
Big data security features and operation practices
Published 2021-05-01Subjects: “…big data…”
Get full text
Article -
678
-
679
Hyperdimensional computing: a framework for stochastic computation and symbolic AI
Published 2024-10-01Get full text
Article -
680
Enhancing Gen3 for clinical trial time series analytics and data discovery: a data commons framework for NIH clinical trials
Published 2025-07-01Subjects: “…data commons…”
Get full text
Article