The U.S. FDA classifies food recalls into three severity tiers (Class I / II / III), a decision that drives public notification urgency and regulatory resource allo-cation. Using 28,448 openFDA enforc...
Trusted computing systems and blockchain-enabled security applications increas- ingly rely on Graph Neural Networks (GNNs) for trust graph analysis, fraud detection, and anomaly identification. In the...
Large-scale genomics pipelines generate petabyte-class datasets whose I/O access patterns are governed by discrete biological processingstages rather than by file recency or age. Conventional time-bas...
The rapid growth of the Internet of Things (IoT) introduces challenges in secure authentication and delegation due to the limited computational capabilities of devices. Proxy signature schemes offer ...
Recurrence relations are computational primitives across scientific computing, from orthogonal polynomials to molecular integral evaluation. Traditional implementations face a dual expertise barrier: ...
In modern manufacturing value chains, achieving optimal product quality and sustainability necessitates collaboration across interconnected stakeholders. Conventional Latent Variable Model Inversion (...
Detecting abnormal internal temperatures in inverters is a critical aspect of ensuring the safe operation of power equipment. To address the shortcomings of existing methods in detecting minute therma...
Device-to-device (D2D) communications play a key role in today's communication infrastructures. They help optimise network capacity, reduce latency and enhance quality of service. The main difficulty ...
Rerandomization is an experimental design technique that repeatedly randomizes treatment assignments until covariates are balanced between treatment groups. Rerandomization in the design stage of an e...
In the realm of Kubernetes (K8s) resource scheduling, studies frequently focus on individual resource efficiency or performance metrics. Alternatively, they may merely refine K8s' default scheduling p...
SinoXiv