Showing 21 - 40 results of 96 for search 'Problemista~', query time: 4.13s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25

    Paul Groussac. Un articulador cultural en el pasaje del siglo XIX al XX argentino by Paula Bruno

    Published 2006-01-01
    “…Groussac fue un personaje muy versátil y se desempeñó como profesor de destacadas instituciones educativas: Director de la Biblioteca Nacional, polemista, director de destacadas publicaciones, ensayista, crítico literario e historiador; se presentan aquí algunas de los rasgos particulares de su trayectoria pública multifacética.…”
    Get full text
    Article
  6. 26

    Intelligent adaptation and integrated scheduling method for computing and networking resources by Weiting ZHANG, Chenghui SUN, Hongchao WANG, Jianing DAI

    Published 2023-08-01
    “…To effectively support the development needs of the deep integration of networking and computing, a novel computing and network convergence architecture has emerged.In this context, how to realize the intelligent perception of computing and networking resources and the efficient scheduling of computational tasks are key problems.To this end, the new network scenario for computing and networking convergence were analyzed, a scheduling model for computing tasks and nodes was designed, and a deep reinforcement learning-based resource scheduling algorithm was proposed.The proposed algorithm was able to intelligently make scheduling decisions that minimize the system cost by sensing key information such as user devices, available capacity of computing and networking resources, and link status.Finally, the effectiveness of the proposed algorithm in saving system cost was verified by simulation experiments.…”
    Get full text
    Article
  7. 27

    Provably secure certificateless aggregate signature scheme in wireless roaming authentication by Zhi-yan XU, Li-bing WU, Li LI, De-biao HE

    Published 2017-07-01
    “…Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced .…”
    Get full text
    Article
  8. 28

    Research on secure DPC localization algorithm of WSN by ZHAN Jie1, LIU Hong-li1, LIU Da-wei1, ZHAO Ming3

    Published 2011-01-01
    “…In resource-constrained sensor networks,how to locate the sensor’s coordinates securely and effectively is one of the most challenging problems.A lot of algorithms of the security localization were analyzed,and a distributed RSSI-based DPC(distance and position consistent) security location algorithm was brought forth.The algorithm can de-tect and filter out the false nodes that are generated by malicious attacks applying the consistency of measure and com-puting;meanwhile all the nodes are involved in the activation without a central node.The performance of the algorithm is studied,and the experimental results show that DPC still has very high efficiency and good robustness in noisy conditions with a number of false nodes.…”
    Get full text
    Article
  9. 29
  10. 30
  11. 31
  12. 32

    Power allocation algorithm for cognitive radio energy harvesting networks based on energy cooperation by Zhen-wei XIE, Qi ZHU

    Published 2017-09-01
    “…An algorithm to optimize the power allocation by maximizing the system throughput in cognitive radio energy harvesting networks was proposed.The algorithm formulated the throughput optimization model subject to the causality constraints of the harvested energy within the two secondary users and the interference constraint of the primary user.In addition,by applying the variable-substitution method and problem equivalence transformation,the joint optimization problem of power and cooperative energy was decoupled into two problems:a power allocation problem and a cooperative energy one.The former problem could be solved by iterating the two decoupled problems.As shown in the simulation results,the energy cooperation can significantly improve the system throughput when the harvested energy difference between two nodes is rather large.…”
    Get full text
    Article
  13. 33

    Status and Prospect of Reclaimed Water Reuse in China by GUO Xingxing, LUO Huan, LI Ning

    Published 2023-01-01
    “…The shortage of water resources is the main obstacle to China's economic development,and the reuse of reclaimed water is an effective way to solve this problem.It is urgent to clarify the development status and existing problems of the reclaimed water industry in China,so as to achieve urban ecological and sustainable development.This study reviewed the policies,regulations,and standards of reclaimed water reuse in China and summarized the main ways to reuse reclaimed water.The development status and application examples of reclaimed water treatment technology were introduced,and future development was predicted.In summary,this paper put forward four suggestions for the reuse of reclaimed water in China:①perfecting the standards and specifications of reclaimed water reuse;②strengthening the transformation of the reclaimed water treatment process in sewage treatment plants;③establishing risk assessment system of reclaimed water;④intensifying the construction planning for the urban reclaimed water reuse.…”
    Get full text
    Article
  14. 34

    VM migration across subnets in future internet architecture—XIA by Hong-wei MENG, Zhong CHEN, Zi-qian MENG, Chuck SONG

    Published 2016-03-01
    “…When a VM migrates among hosts residing in two IP subnets,the network attachment point of VM changed,which causes the IP mobility problem.It was meaningful to design and evaluate VM migration performance under the future internet architecture.XIA (expressive Internet architecture)was focused,a novel future internet architecture,sup-port for VM live migration.Motivated by the natural f res of ID/location decoupling,versatile routing with DAG (di-rected acyclic graphs) in XIA,The design and implementation of rendezvous agent based migration (RABM) approach was given.In demonstrate that XIA supported VM migration can achieve fast network re-connection between VM and correspondent node,while keeping the network control plane simplicity and data plane efficiency.…”
    Get full text
    Article
  15. 35

    Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security by Aiqun HU, Guyue LI, Linning PENG, Tao LI

    Published 2019-06-01
    “…,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
    Get full text
    Article
  16. 36
  17. 37
  18. 38
  19. 39
  20. 40