112 results found

Juk-Sen TANG, Peilun Li, Junhong Chen

The U.S. FDA classifies food recalls into three severity tiers (Class I / II / III), a decision that drives public notification urgency and regulatory resource allo-cation. Using 28,448 openFDA enforc...

Scientific Reports 2026-04-23 rs-9173480
Food recall severity FDA enforcement Firm-level risk profiling Hazard-severity association Regulatory decision support Entity-level evaluation openFDA

Hwan Kim, Jiha Kim, Seunghyun Park, Hyunhee Park

Trusted computing systems and blockchain-enabled security applications increas- ingly rely on Graph Neural Networks (GNNs) for trust graph analysis, fraud detection, and anomaly identification. In the...

Discover Computing 2026-04-23 rs-9264474
Graph Neural Networks Noise Robustness KL Divergence Adaptive Correction Trusted Computing Blockchain Security

Tushar Pathare, Sandeep Patil, Frank Lee

Large-scale genomics pipelines generate petabyte-class datasets whose I/O access patterns are governed by discrete biological processingstages rather than by file recency or age. Conventional time-bas...

The Journal of Supercomputing 2026-04-23 rs-8987940
IBM GPFS IBM Spectrum Scale Integrated Lifecycle Management genomics bioinformatics storage tiering workflow metadata NVMe HPC data lifecycle management POSIX extended attributes xattr Nextflow Snakemake GATK variant calling sequencing autonomous storage policy

Somnath Kumar, Kunal Dey, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Shehzad Ashraf Chaudhry

 The rapid growth of the Internet of Things (IoT) introduces challenges in secure authentication and delegation due to the limited computational capabilities of devices. Proxy signature schemes offer ...

Scientific Reports 2026-04-23 rs-9295947
Isogeny-based public-key cryptography IoT proxy signature post-quantum cryptography elliptic curve cryptography

Ruben Dario Guerrero

Recurrence relations are computational primitives across scientific computing, from orthogonal polynomials to molecular integral evaluation. Traditional implementations face a dual expertise barrier: ...

Research Square 2026-04-23 rs-8773066
Scientific computing Recurrence relations Domain-specific language Automatic code generation

Du Nguyen Duy, Ramin Nikzad-Langerodi, Josef Scharinger, Michael Affenzeller

In modern manufacturing value chains, achieving optimal product quality and sustainability necessitates collaboration across interconnected stakeholders. Conventional Latent Variable Model Inversion (...

Discover Artificial Intelligence 2026-04-23 rs-9243934
Cross-organizational Process Optimization Partial Least Squares Cooperative Coevolution Genetic Algorithm Vertical Federated Learning Latent Variable Model Inversion

Shizhou Xu, Shuo Li

Detecting abnormal internal temperatures in inverters is a critical aspect of ensuring the safe operation of power equipment. To address the shortcomings of existing methods in detecting minute therma...

The Journal of Supercomputing 2026-04-23 rs-9373711
Inverter Temperature anomaly detection YOLOv8 Multi-task output attention mechanism

NGIMBOG MBOGUE Joseph, KONLACK TALLA Belmien Carlos, VIDEME BOSSOU Olivier, TCHUIDJAN Roger

Device-to-device (D2D) communications play a key role in today's communication infrastructures. They help optimise network capacity, reduce latency and enhance quality of service. The main difficulty ...

Wireless Personal Communications 2026-04-23 rs-9032690
D2D; D2D communications 5G Clustering Cluster-head
Research Article under-review

Langevin-Gradient Rerandomization

Antônio Carlos Herling Ribeiro Junior

Rerandomization is an experimental design technique that repeatedly randomizes treatment assignments until covariates are balanced between treatment groups. Rerandomization in the design stage of an e...

Statistics and Computing 2026-04-23 rs-9473741
rerandomization design of experiments causal inference stochastic gradient descent

Zhang Liansheng, Meng Haosheng, Liu Lijun

In the realm of Kubernetes (K8s) resource scheduling, studies frequently focus on individual resource efficiency or performance metrics. Alternatively, they may merely refine K8s' default scheduling p...

Discover Computing 2026-04-23 rs-9229065
Kubernetes Container scheduling Multi-objective modeling NSGA-II
Back to Top
Home
Browse
Submit
About
0.033060s