We investigate tolerant testing and distance estimation problems in distribution testing when the amount of memory is limited. In particular, our aim is to provide a good estimate of the distance measure (in total var...
详细信息
This paper introduces a comprehensive framework for deploying and evaluating the performance of applications in serverless cloud environments for microservices. It addresses challenges stemming from the distributed na...
详细信息
In developing countries, rural areas often lack integrated medical systems, leading to pregnant women not receiving regular checkups, resulting in higher death rates for newborns and parents. This presents significant...
详细信息
In recent years, the advances in digitalisation have also adversely contributed to the significant rise in cybercrimes. Hence, building the threat intelligence to shield against rising cybercrimes has become a fundame...
详细信息
Effective evaluation of machine translation (MT) systems is critical for cross-lingual communication. Current methods like BLEU, METEOR, and BLEURT often fail to capture linguistic nuances. This paper examines the lim...
详细信息
Federated Learning (FL) is a promising approach for training machine learning models in a decentralized manner to preserve data privacy. However, FL is vulnerable to various attacks, including label-flipping attacks w...
详细信息
Agriculture is backbone of many economies but still farmers often face many challenges in accessing financial services or available resources for them, making informed crop choices and participating in government init...
详细信息
This paper presents the outcomes of two key projects dedicated to the enhancement of modern transportation infrastructure and communication technology. The first project introduces a web-based application for toll tax...
详细信息
Identifying risky driving behavior is crucial for early hazard detection, encouraging safer driving practices, and minimizing accident risks. Driving patterns, characterized by sensory data, can be used to classify ri...
详细信息
Cloud security encompasses the deployment of advanced technologies, methodologies, and programming to safeguard cloud-based applications, ensuring their protection against potential threats and vulnerabilities. Cloud ...
详细信息
暂无评论