Future Generation Computer Systems-The International Journal of Escience最新文献

筛选
英文 中文
DDPG-AdaptConfig: A deep reinforcement learning framework for adaptive device selection and training configuration in heterogeneity federated learning DDPG-AdaptConfig:异构联合学习中用于自适应设备选择和训练配置的深度强化学习框架
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-12 DOI: 10.1016/j.future.2024.107528
{"title":"DDPG-AdaptConfig: A deep reinforcement learning framework for adaptive device selection and training configuration in heterogeneity federated learning","authors":"","doi":"10.1016/j.future.2024.107528","DOIUrl":"10.1016/j.future.2024.107528","url":null,"abstract":"<div><div>Federated Learning (FL) is a distributed machine learning approach that protects user privacy by collaboratively training shared models across devices without sharing their raw personal data. Despite its advantages, FL faces issues of increased convergence time and decreased accuracy due to the heterogeneity of data and systems across devices. Existing methods for solving these issues using reinforcement learning often ignore the adaptive configuration of local training hyperparameters to suit varying data characteristics and system resources. Moreover, they frequently overlook the heterogeneous information contained within local model parameters. To address these problems, we propose the DDPG-AdaptConfig framework based on Deep Deterministic Policy Gradient (DDPG) for adaptive device selection and local training hyperparameters configuration in FL to speed up convergence and ensure high model accuracy. Additionally, we develop a new actor network that integrates the transformer mechanism to extract heterogeneous information from model parameters, which assists in device selection and hyperparameters configuration. Furthermore, we introduce a clustering-based aggregation strategy to accommodate heterogeneity and prevent performance declines. Experimental results show that our DDPG-AdaptConfig achieves significant improvements over existing baselines.</div></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems ZeroVCS:零信任车载通信系统的高效无信任机构认证协议
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-11 DOI: 10.1016/j.future.2024.107520
{"title":"ZeroVCS: An efficient authentication protocol without trusted authority for zero-trust vehicular communication systems","authors":"","doi":"10.1016/j.future.2024.107520","DOIUrl":"10.1016/j.future.2024.107520","url":null,"abstract":"<div><p>Vehicular communication systems can provide two types of communications: Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V). However, in both cases, there is zero-trust between the communicating entities. This may give privilege to the unauthorized vehicles to join the network. Hence, a strong authentication protocol is required to ensure proper access control and communication security. In traditional protocols, such tasks are typically accomplished via a central Trusted Authority (TA). However, communication with TA may increase the overall authentication delay. Such delay may be incompatible with the future generation vehicular communication systems, where dense deployment of small-cells are required to ensure higher system capacity and seamless mobility (e.g., 5G onward). Further, TA may suffer from denial-of-service when the number of access requests becomes excessively large, because each request must be forwarded to TA for authentication and access control. In this article, we put forward an efficient authentication protocol without trusted authority for zero-trust vehicular communication systems, called ZeroVCS. It does not involve TA for authentication and access control, thus improving the authentication delay, reducing the chance of denial-of-service, and ensuring compatibility with the future generation vehicular communication systems. ZeroVCS can also provide communication security under various passive and active attacks. Finally, the performance-based comparison proves the efficiency of ZeroVCS.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bus travel feature inference with small samples based on multi-clustering topic model over Internet of Things 基于物联网多聚类主题模型的小样本公交出行特征推理
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-11 DOI: 10.1016/j.future.2024.107525
{"title":"Bus travel feature inference with small samples based on multi-clustering topic model over Internet of Things","authors":"","doi":"10.1016/j.future.2024.107525","DOIUrl":"10.1016/j.future.2024.107525","url":null,"abstract":"<div><p>With the widespread application of Internet of Things (IoT) technology, there has been a shift from a broad-brush to a more refined approach in traffic optimization. An increasing amount of IoT data is being utilized in trajectory mining and inference, offering more precise characteristic information for optimizing public transportation. Services that optimize public transit based on inferred travel characteristics can enhance the appeal of public transport, increase its likelihood as a travel choice, alleviate traffic congestion, and reduce carbon emissions. However, the inherent complexities of disorganized and unstructured public transportation data pose significant challenges to extracting travel features. This study explores the enhancement of bus travel by integrating advanced technologies like positioning systems, IoT, and AI to infer features in public transportation data. It introduces the MK-LDA (MeanShift Kmeans Latent Dirichlet Allocation), a novel thematic modeling technique for deducing characteristics of public transit travel using limited travel trajectory data. The model employs a segmented inference methodology, initially leveraging the Mean-shift clustering algorithm to create POI seeds, followed by the P-K-means algorithm for discerning patterns in user travel behavior and extracting travel modalities. Additionally, a P-LDA (POI-Latent Dirichlet Allocation) inference algorithm is proposed to examine the interplay between travel characteristics and behaviors, specifically targeting attributes significantly correlated with public transit usage, including age, occupation, gender, activity levels, cost, safety, and personality traits. Empirical validation highlights the efficacy of this thematic modeling-based inference technique in identifying and predicting travel characteristics and patterns, boasting enhanced interpretability and outperforming conventional benchmarks.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Expanding SafeSU capabilities by leveraging security frameworks for contention monitoring in complex SoCs 利用安全框架监控复杂 SoC 中的争用情况,扩展 SafeSU 功能
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-11 DOI: 10.1016/j.future.2024.107518
{"title":"Expanding SafeSU capabilities by leveraging security frameworks for contention monitoring in complex SoCs","authors":"","doi":"10.1016/j.future.2024.107518","DOIUrl":"10.1016/j.future.2024.107518","url":null,"abstract":"<div><p>The increased performance requirements of applications running on safety-critical systems have led to the use of complex platforms with several CPUs, GPUs, and AI accelerators. However, higher platform and system complexity challenge performance verification and validation since timing interference across tasks occurs in unobvious ways, hence defeating attempts to optimize application consolidation informedly during design phases and validating that mutual interference across tasks is within bounds during test phases.</p><p>In that respect, the SafeSU has been proposed to extend inter-task interference monitoring capabilities in simple systems. However, modern mixed-criticality systems are complex, with multilayered interconnects, shared caches, and hardware accelerators. To that end, this paper proposes a non-intrusive add-on approach for monitoring interference across tasks in multilayer heterogeneous systems implemented by leveraging existing security frameworks and the SafeSU infrastructure.</p><p>The feasibility of the proposed approach has been validated in an RTL RISC-V-based multicore SoC with support for AI hardware acceleration. Our results show that our approach can safely track contention and properly break down contention cycles across the different sources of interference, hence guiding optimization and validation processes.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167739X24004825/pdfft?md5=297490284a18935898d8133344acc50d&pid=1-s2.0-S0167739X24004825-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142167923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DetectVul: A statement-level code vulnerability detection for Python DetectVul:针对 Python 的语句级代码漏洞检测
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-10 DOI: 10.1016/j.future.2024.107504
{"title":"DetectVul: A statement-level code vulnerability detection for Python","authors":"","doi":"10.1016/j.future.2024.107504","DOIUrl":"10.1016/j.future.2024.107504","url":null,"abstract":"<div><p>Detecting vulnerabilities in source code using graph neural networks (GNN) has gained significant attention in recent years. However, the detection performance of these approaches relies highly on the graph structure, and constructing meaningful graphs is expensive. Moreover, they often operate at a coarse level of granularity (such as function-level), which limits their applicability to other scripting languages like Python and their effectiveness in identifying vulnerabilities. To address these limitations, we propose DetectVul, a new approach that accurately detects vulnerable patterns in Python source code at the statement level. DetectVul applies self-attention to directly learn patterns and interactions between statements in a raw Python function; thus, it eliminates the complicated graph extraction process without sacrificing model performance. In addition, the information about each type of statement is also leveraged to enhance the model’s detection accuracy. In our experiments, we used two datasets, CVEFixes and Vudenc, with 211,317 Python statements in 21,571 functions from real-world projects on GitHub, covering seven vulnerability types. Our experiments show that DetectVul outperforms GNN-based models using control flow graphs, achieving the best F1 score of 74.47%, which is 25.45% and 18.05% higher than the best GCN and GAT models, respectively.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bodyless block propagation: TPS fully scalable blockchain with pre-validation 无主体区块传播:带有预验证功能的 TPS 完全可扩展区块链
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-07 DOI: 10.1016/j.future.2024.107516
{"title":"Bodyless block propagation: TPS fully scalable blockchain with pre-validation","authors":"","doi":"10.1016/j.future.2024.107516","DOIUrl":"10.1016/j.future.2024.107516","url":null,"abstract":"<div><p>Despite numerous prior attempts to boost transaction per second (TPS) of blockchain system, most of them were at a price of degraded decentralization and security. In this paper, we propose a bodyless block propagation (BBP) scheme for which the blockbody is not validated and transmitted during the block propagation process, to increase TPS without compromising security. Rather, the nodes in the blockchain network anticipate the transactions and their ordering in the next upcoming block so that these transactions can be pre-executed and pre-validated before the birth of the block. It is critical, however, that all nodes have a consensus on the transaction content of the next block.</p><p>This paper puts forth a transaction selection, ordering, and synchronization algorithm to drive the nodes to reach such a consensus. Yet, the Coinbase Address of the miner of the next block cannot be anticipated, and therefore transactions that depend on the Coinbase Address cannot be pre-executed and pre-validated. This paper further puts forth an algorithm to deal with such unresolvable transactions for an overall consistent and TPS-efficient scheme. With our scheme, most transactions do not need to be validated and transmitted during block propagation, ridding the dependence of propagation time on the number of transactions in the block, and making the system fully TPS scalable. Experimental results show that our protocol can reduce propagation time by 4<span><math><mo>×</mo></math></span> with respect to the current Ethereum blockchain, and its TPS performance is limited by the node hardware performance rather than block propagation.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent transportation system for automated medical services during pandemic 大流行病期间自动医疗服务的智能交通系统
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-05 DOI: 10.1016/j.future.2024.107515
{"title":"Intelligent transportation system for automated medical services during pandemic","authors":"","doi":"10.1016/j.future.2024.107515","DOIUrl":"10.1016/j.future.2024.107515","url":null,"abstract":"<div><p>Infectious viruses are spread during human-to-human contact and can cause worldwide pandemics. We have witnessed worldwide disasters during the COVID-19 pandemic because of infectious viruses, and these incidents often unfold in various phases and waves. During this pandemic, so many deaths have occurred worldwide that they cannot even be counted accurately. The biggest issue that comes to the forefront is that health workers going to treat patients suffering from COVID-19 also may get infected. Many health workers have lost their lives to COVID-19 and are still losing their lives. The situation can worsen further by coinciding with other natural disasters like cyclones, earthquakes, and tsunamis. In these situations, an intelligent automated model is needed to provide contactless medical services such as ambulance facilities and primary health tests. In this paper, we explore these types of services safely with the help of an intelligent automated transportation model using a vehicular delay-tolerant network. To solve the scenario, we propose an intelligent transportation system for automated medical services to prevent healthcare workers from becoming infected during testing and collecting health data by collaborating with a delay-tolerant network of vehicles in intelligent transport systems. The proposed model automatically categorizes and filters infected patients, providing medical facilities based on their illnesses. Our mathematical evaluation and simulation results affirm the effectiveness and feasibility of the proposed model, highlighting its strength compared to existing state-of-the-art protocols.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Digital Twin-based multi-objective optimized task offloading and scheduling scheme for vehicular edge networks 基于数字双胞胎的车载边缘网络多目标优化任务卸载和调度方案
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-04 DOI: 10.1016/j.future.2024.107517
{"title":"A Digital Twin-based multi-objective optimized task offloading and scheduling scheme for vehicular edge networks","authors":"","doi":"10.1016/j.future.2024.107517","DOIUrl":"10.1016/j.future.2024.107517","url":null,"abstract":"<div><p>Traditional research on vehicular edge computing often assumes that the requested and processed task types are the same or that the edge servers have identical computing resources, ignoring the heterogeneity of task types in mobile vehicles and the services provided by edge servers. Meanwhile, the complexity of the vehicular edge environment and the large amount of real-time data required by DRL are often ignored when using Deep Reinforcement Learning (DRL) to process the vehicular edge tasks; Furthermore, traditional offloading and scheduling models are usually based on idealized models with deterministic task quantities and a single objective (such as latency or energy consumption). This paper proposes a Digital Twin(DT)-based multi-objective optimized task offloading and scheduling scheme for vehicular edge networks to address these issues. To address the complexity of vehicular edge environments and the need for a large amount of real-time data for DRL, this paper designs a DT-assisted vehicular edge environment; To tackle the problem of task heterogeneity in mobile vehicles and edge server service differentiation, a computation model based on Deep Neural Networks (DNN) partitioning and an early exit mechanism is proposed, which leverages the resources of mobile vehicles and edge servers to reduce the time and energy consumption of DNN tasks during the computation process. For the uncertain task quantity of DNN tasks, a schedule model based on the pointer network and Asynchronous Advantage Actor-Critic (A3C) is proposed, which utilizes the characteristics of the pointer network in handling variable-length sequence problems to solve it and trains the pointer network with the A3C algorithm for improved performance. Moreover, this paper introduces the joint optimization of multiple metrics, including energy consumption and latency. Experimental comparative analysis demonstrates that the proposed scheme outperforms other schemes and can reduce time and energy consumption.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Olsync: Object-level tiering and coordination in tiered storage systems based on software-defined network Olsync:基于软件定义网络的分层存储系统中的对象级分层与协调
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-04 DOI: 10.1016/j.future.2024.107521
{"title":"Olsync: Object-level tiering and coordination in tiered storage systems based on software-defined network","authors":"","doi":"10.1016/j.future.2024.107521","DOIUrl":"10.1016/j.future.2024.107521","url":null,"abstract":"<div><p>With the adoption of new storage technologies like NVMs, tiered storage has gained popularity in large-scale, hyper-converged clusters. The storage back-end of hyper-converged systems supports data storage on devices such as SSDs and HDDs, yet lacks fine-grained tiered storage solutions. For example, Ceph selects storage nodes based primarily on limited criteria, such as node storage capacity, disregarding the diverse performance characteristics of various storage media. In this study, we introduce Olsync, an object-level tiering and coordination system designed to enhance storage resource utilization and data access performance. Specifically, Olsync employs PIPO (Packet-In-Packet-Out), an innovative network communication framework based on Software-defined Networking (SDN), to collaboratively optimize both the network control plane and underlying data plane. Additionally, Olsync can offer efficient object-level tiering and coordination services using the global views obtained by PIPO (e.g., data access patterns and interfering object requests) to make tiered storage and performance optimization decisions. We incorporated the Olsync prototype into Ceph and performed a thorough comparison with contemporary state-of-the-art systems. The evaluation results demonstrate that Olsync significantly enhances system response time (up to 68%), I/O throughput (up to 24%), and 99th percentile latency (up to 16%) in various environments.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks 基于区块链-SDN 的集成物联网网络的联合能效和网络优化
IF 6.2 2区 计算机科学
Future Generation Computer Systems-The International Journal of Escience Pub Date : 2024-09-04 DOI: 10.1016/j.future.2024.107519
{"title":"Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks","authors":"","doi":"10.1016/j.future.2024.107519","DOIUrl":"10.1016/j.future.2024.107519","url":null,"abstract":"<div><p>The Internet of Things (IoT) networks are poised to play a critical role in providing ultra-low latency and high bandwidth communications in various real-world IoT scenarios. Assuring end-to-end secure, energy-aware, reliable, real-time IoT communication is hard due to the heterogeneity and transient behavior of IoT networks. Additionally, the lack of integrated approaches to efficiently schedule IoT tasks and holistically offload computing resources, and computational limits in IoT systems to achieve effective resource utilization. This paper makes three contributions to research on overcoming these problems in the context of distributed IoT systems that use the Software Defined Networking (SDN) programmable control plane in symbiosis with blockchain to benefit from the dispersed or decentralized, and efficient environment of distributed IoT transactions over Wide Area Networks (WANs). First, it introduces a Blockchain-SDN architectural component to reinforce flexibility and trustworthiness and improve the Quality of Service (QoS) of IoT networks. Second, it describes the design of an IoT-focused smart contract that implements the control logic to manage IoT data, detect and report suspected IoT nodes, and mitigate malicious traffic. Third, we introduce a novel consensus algorithm based on the Proof-of-Authority (PoA) to achieve agreements between blockchain-enabled IoT nodes, improve the reliability of IoT edge devices, and establish absolute trust among all smart IoT systems. Experimental results show that integrating SDN with blockchain outperforms traditional Proof-of-Work (PoW) and Practical Byzantine Fault Tolerance (PBFT) algorithms, delivering up to 68% lower latency, 87% higher transaction throughput, and 45% better energy savings.</p></div>","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":null,"pages":null},"PeriodicalIF":6.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信