With the widespread adoption of cryptocurrencies, associated illicit activities such as money laundering, fraud, extortion, and Ponzi schemes have garnered significant attention. Traditional studies have extensively e...
详细信息
The paper “Fixed-point quantum continuous search algorithm with optimal query complexity’’[1] presents another interesting application of quantum search algorithms by addressing one of the long-standing challenges ...
The paper “Fixed-point quantum continuous search algorithm with optimal query complexity’’[1] presents another interesting application of quantum search algorithms by addressing one of the long-standing challenges in quantum computing:how to efficiently perform search over continuous domains. While Grover’s algorithm has been a cornerstone in discrete quantum search with its well-known quadratic speedup [2], many real-world problems—ranging from high-dimensional optimization to spectral analysis of infinite dimensional operators—require searching over continuous, uncountably infinite solution spaces.
Mobile Edge Computing(MEC)is proposed to solve the needs of Inter-net of Things(IoT)users for high resource utilization,high reliability and low latency of service ***,the backup virtual machine is idle when its prima...
详细信息
Mobile Edge Computing(MEC)is proposed to solve the needs of Inter-net of Things(IoT)users for high resource utilization,high reliability and low latency of service ***,the backup virtual machine is idle when its primary virtual machine is running normally,which will waste *** the backup virtual machine under the above circumstances can effectively improve resource ***,these virtual machines are deployed into slots randomly,and then some tasks with cooperative relationship are off-loaded to virtual machines for *** deployment locations have different resource utilization and average service response *** want tofind a balanced solution that minimizes the average service response time of the IoT application while maximizing resource *** this paper,we propose a task scheduler and exploit a Task Deployment Algorithm(TDA)to obtain an optimal virtual machine deployment ***,the simulation results show that the TDA can significantly increase the resource utilization of the system,while redu-cing the average service response time of the application by comparing TDA with the other two classical *** experimental results confirm that the perfor-mance of TDA is better than that of other two methods.
This paper addresses mathematical methods to reduce or segment the search space for big data solutions into distinct subspaces with partial solutions. It is achieved by using a data organization structure of 'm-tu...
详细信息
First-order optimization (FOO) algorithms are pivotal in numerous computational domains, such as reinforcement learning and deep learning. However, their application to complex tasks often entails significant optimiza...
In recent years, surrogate-Assisted evolutionary algorithms (SAEAs) have been sufficiently studied for tackling computationally expensive multiobjective optimization problems (EMOPs), as they can quickly estimate the ...
详细信息
作者:
Xiao, ZhiyuanWang, ChenShen, JianWu, Q. M. JonathanHe, DebiaoZhejiang Sci-Tech University
School of Information Science and Engineering School of Cyber Science and Technology the Zhejiang Provincial Key Laboratory of Digital Fashion and Data Governance Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Hangzhou310018 China University of Windsor
Department of Electrical and Computer Engineering WindsorON Canada Wuhan University
State Key Laboratory of Software Engineering Computer School Wuhan430072 China
In cryptography, side-channel analysis (SCA) is a technique used to recover cryptographic keys by examining the physical leakages that occur during the operation of cryptographic devices. Recent advancements in Deep L...
详细信息
Under the background that the construction of artificial intelligence technology and intelligent science has become a national strategy, how to establish the development direction of professional characteristics and b...
详细信息
The challenges associated with using pre-trained models (PTMs) have not been specifically investigated, which hampers their effective utilization. To address this knowledge gap, we collected and analyzed a dataset of ...
详细信息
Personalized Federated Learning (pFL) is among the most popular tasks in distributed deep learning, which compensates for mutual knowledge and enables device-specific model personalization. However, the effectiveness ...
详细信息
暂无评论