首页 > 最新文献

计算机科学最新文献

英文 中文
IF:
A study on front vehicle collision warning method based on lightweight YOLOv8 and DeepSort 基于轻量级YOLOv8和DeepSort的前车碰撞预警方法研究
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-12-19 DOI: 10.1016/j.eij.2025.100861
Wenyu Zhang , Yajing Li , Jiaxuan Hu , Ning Wang
With the continuous increase in vehicle ownership, the frequency of traffic accidents has risen significantly, and higher demands have consequently been placed on active vehicle safety technologies. To address the challenges of insufficient real-time performance and high model complexity in traditional object detection methods under complex traffic conditions, an improved front-vehicle collision warning system has been proposed by integrating YOLOv8 and DeepSort. In this approach, the original YOLOv8 backbone network is replaced by the lightweight MobileNet V4, and the Convolutional Block Attention Module (CBAM) is incorporated to enhance feature extraction capabilities. A comprehensive algorithmic framework has been constructed, integrating multi-object recognition, front-vehicle distance estimation, ego-vehicle speed calculation, and hierarchical warning level output. Experimental results on the KITTI dataset have demonstrated a detection accuracy of 95.5 % and a total detection time of 2.6 ms per frame. Additionally, a 2.6 % improvement in mAP50–95 has been observed, accompanied by only a 0.1 % decrease in the recall rate. These findings suggest that the proposed method provides effective technical support for front-vehicle collision warning in intelligent transportation environments.
随着机动车保有量的不断增加,交通事故的发生频率显著上升,对车辆主动安全技术提出了更高的要求。针对传统目标检测方法在复杂交通条件下实时性不足、模型复杂度高的问题,将YOLOv8与DeepSort相结合,提出了一种改进的前车碰撞预警系统。在这种方法中,原始的YOLOv8骨干网络被轻量级的MobileNet V4取代,并加入卷积块注意模块(CBAM)来增强特征提取能力。构建了集多目标识别、前车距离估计、自车速度计算、预警等级输出于一体的综合算法框架。在KITTI数据集上的实验结果表明,检测准确率为95.5%,总检测时间为2.6 ms /帧。此外,观察到mAP50-95有2.6%的改善,同时召回率仅下降0.1%。研究结果表明,该方法为智能交通环境下的前车碰撞预警提供了有效的技术支持。
{"title":"A study on front vehicle collision warning method based on lightweight YOLOv8 and DeepSort","authors":"Wenyu Zhang ,&nbsp;Yajing Li ,&nbsp;Jiaxuan Hu ,&nbsp;Ning Wang","doi":"10.1016/j.eij.2025.100861","DOIUrl":"10.1016/j.eij.2025.100861","url":null,"abstract":"<div><div>With the continuous increase in vehicle ownership, the frequency of traffic accidents has risen significantly, and higher demands have consequently been placed on active vehicle safety technologies. To address the challenges of insufficient real-time performance and high model complexity in traditional object detection methods under complex traffic conditions, an improved front-vehicle collision warning system has been proposed by integrating YOLOv8 and DeepSort. In this approach, the original YOLOv8 backbone network is replaced by the lightweight MobileNet V4, and the Convolutional Block Attention Module (CBAM) is incorporated to enhance feature extraction capabilities. A comprehensive algorithmic framework has been constructed, integrating multi-object recognition, front-vehicle distance estimation, ego-vehicle speed calculation, and hierarchical warning level output. Experimental results on the KITTI dataset have demonstrated a detection accuracy of 95.5 % and a total detection time of 2.6 ms per frame. Additionally, a 2.6 % improvement in mAP50–95 has been observed, accompanied by only a 0.1 % decrease in the recall rate. These findings suggest that the proposed method provides effective technical support for front-vehicle collision warning in intelligent transportation environments.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"33 ","pages":"Article 100861"},"PeriodicalIF":4.3,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust eclipse attack detection framework for Ethereum networks 一个健壮的eclipse攻击检测框架用于以太坊网络
IF 8 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-12-19 DOI: 10.1016/j.jnca.2025.104416
Zubaida Rehman , Iqbal Gondal , Hai Dong , Mengmeng Ge , Mark A. Gregory , Ikram ul Haq
Eclipse attacks, which isolate victim nodes by monopolizing their peer connections, remain a critical threat to Ethereum’s consensus mechanism. To address this, we present a principled framework for detecting Eclipse attacks in Ethereum peer-to-peer networks, grounded in a formal adversarial model. Existing defenses are either ad-hoc or lack provable guarantees, leaving open questions about their reliability under adaptive adversaries. Our work aims to bridge this gap by formally defining eclipse attack detection as a security property. We specify soundness, completeness, and robustness theorems under bounded adversarial drift, and derive formal guarantees within false positive and false negative bounds, resilience to adversarial manipulation, and multi-node compositional reliability. We then instantiate a lightweight detection framework that maps packet-level traffic features to predictions using ensemble classifiers (Random Forest, XGBoost). The system was validated using a controlled Ethereum testbed and extended with CTGAN-generated synthetic traces to emulate networks of up to 100 nodes. Empirical evaluation shows that our framework achieves up to 96% F1-score with sub-second inference latency, well within Ethereum’s 12-second Proof-of-Stake validator time slots. These findings demonstrate that lightweight statistical features, when coupled with formal analysis, enable accurate, efficient, and scalable detection of network-level partitioning attacks. Our work establishes a deployable and theoretically grounded defense foundation for securing modern blockchain systems against eclipse adversaries.
Eclipse攻击通过垄断受害节点的对等连接来隔离受害节点,这仍然是对以太坊共识机制的严重威胁。为了解决这个问题,我们提出了一个原则性框架,用于检测以太坊点对点网络中的Eclipse攻击,该框架以正式的对抗模型为基础。现有的防御要么是临时的,要么缺乏可证明的保证,这使得它们在自适应对手下的可靠性问题悬而未决。我们的工作旨在通过将eclipse攻击检测正式定义为一种安全属性来弥合这一差距。我们指定了有界对抗漂移下的稳健性、完备性和鲁棒性定理,并推导了假正和假负边界内的形式保证、对抗操作的弹性和多节点组成可靠性。然后,我们实例化了一个轻量级检测框架,该框架使用集成分类器(Random Forest, XGBoost)将数据包级流量特征映射到预测。该系统使用受控的以太坊测试平台进行了验证,并使用ctgan生成的合成轨迹进行了扩展,以模拟多达100个节点的网络。经验评估表明,我们的框架在亚秒级推理延迟下达到了96%的f1得分,完全在以太坊12秒的权益证明验证器时间段内。这些发现表明,轻量级统计特性与形式化分析相结合,能够准确、高效和可扩展地检测网络级分区攻击。我们的工作为保护现代区块链系统免受eclipse对手的攻击建立了一个可部署的和理论上的防御基础。
{"title":"A robust eclipse attack detection framework for Ethereum networks","authors":"Zubaida Rehman ,&nbsp;Iqbal Gondal ,&nbsp;Hai Dong ,&nbsp;Mengmeng Ge ,&nbsp;Mark A. Gregory ,&nbsp;Ikram ul Haq","doi":"10.1016/j.jnca.2025.104416","DOIUrl":"10.1016/j.jnca.2025.104416","url":null,"abstract":"<div><div>Eclipse attacks, which isolate victim nodes by monopolizing their peer connections, remain a critical threat to Ethereum’s consensus mechanism. To address this, we present a principled framework for detecting Eclipse attacks in Ethereum peer-to-peer networks, grounded in a formal adversarial model. Existing defenses are either ad-hoc or lack provable guarantees, leaving open questions about their reliability under adaptive adversaries. Our work aims to bridge this gap by formally defining eclipse attack detection as a security property. We specify soundness, completeness, and robustness theorems under bounded adversarial drift, and derive formal guarantees within false positive and false negative bounds, resilience to adversarial manipulation, and multi-node compositional reliability. We then instantiate a lightweight detection framework that maps packet-level traffic features to predictions using ensemble classifiers (Random Forest, XGBoost). The system was validated using a controlled Ethereum testbed and extended with CTGAN-generated synthetic traces to emulate networks of up to 100 nodes. Empirical evaluation shows that our framework achieves up to 96% F1-score with sub-second inference latency, well within Ethereum’s 12-second Proof-of-Stake validator time slots. These findings demonstrate that lightweight statistical features, when coupled with formal analysis, enable accurate, efficient, and scalable detection of network-level partitioning attacks. Our work establishes a deployable and theoretically grounded defense foundation for securing modern blockchain systems against eclipse adversaries.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"246 ","pages":"Article 104416"},"PeriodicalIF":8.0,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HydroPalm: Dual-Mode Visual-Tactile Sensing for Underwater Humanoid Robot Hands HydroPalm:水下人形机器人双手的双模式视觉-触觉传感
IF 5.6 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-12-19 DOI: 10.1109/tase.2025.3646231
Jin Ma, Shaowei Cui, Hongfei Chu, Min Tan, Shuo Wang, Yu Wang
{"title":"HydroPalm: Dual-Mode Visual-Tactile Sensing for Underwater Humanoid Robot Hands","authors":"Jin Ma, Shaowei Cui, Hongfei Chu, Min Tan, Shuo Wang, Yu Wang","doi":"10.1109/tase.2025.3646231","DOIUrl":"https://doi.org/10.1109/tase.2025.3646231","url":null,"abstract":"","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"173 1","pages":""},"PeriodicalIF":5.6,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145784439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote robust state estimation for nonlinear systems 非线性系统的远程鲁棒状态估计
IF 6.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-12-19 DOI: 10.1016/j.automatica.2025.112795
Alexander Yu. Pogromsky, Alexey S. Matveev
{"title":"Remote robust state estimation for nonlinear systems","authors":"Alexander Yu. Pogromsky, Alexey S. Matveev","doi":"10.1016/j.automatica.2025.112795","DOIUrl":"https://doi.org/10.1016/j.automatica.2025.112795","url":null,"abstract":"","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"38 1","pages":""},"PeriodicalIF":6.4,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145784445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UDA-RCL: Unsupervised Domain Adaptation for Microservice Root Cause Localization Utilizing Multimodal Data 利用多模态数据进行微服务根本原因定位的无监督域自适应
IF 8.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1109/tsc.2025.3646329
Xiaosong Huang, Hongyi Liu, Yifan Wu, Lingzhe Zhang, Tong Jia, Ying Li, Zhonghai Wu
{"title":"UDA-RCL: Unsupervised Domain Adaptation for Microservice Root Cause Localization Utilizing Multimodal Data","authors":"Xiaosong Huang, Hongyi Liu, Yifan Wu, Lingzhe Zhang, Tong Jia, Ying Li, Zhonghai Wu","doi":"10.1109/tsc.2025.3646329","DOIUrl":"https://doi.org/10.1109/tsc.2025.3646329","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"154 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145784993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Stochastic Performance Model for Evaluating Ethereum Layer-2 Rollups 一种用于评估以太坊第2层rollup的随机性能模型
IF 7.5 2区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-19 DOI: 10.1016/j.future.2025.108316
Carlos Melo, Josã© Miqueias, Johnnatan Messias, Glauber Gonã§alves, Francisco Airton Silva, Andrã© Soares, Jean Araujo
{"title":"A Stochastic Performance Model for Evaluating Ethereum Layer-2 Rollups","authors":"Carlos Melo, Josã© Miqueias, Johnnatan Messias, Glauber Gonã§alves, Francisco Airton Silva, Andrã© Soares, Jean Araujo","doi":"10.1016/j.future.2025.108316","DOIUrl":"https://doi.org/10.1016/j.future.2025.108316","url":null,"abstract":"","PeriodicalId":55132,"journal":{"name":"Future Generation Computer Systems-The International Journal of Escience","volume":"17 1","pages":""},"PeriodicalIF":7.5,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSwinIR: Rethinking Window-Based Attention for Image Restoration DSwinIR:重新思考基于windows的图像恢复注意
IF 23.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-12-19 DOI: 10.1109/tpami.2025.3646016
Gang Wu, Junjun Jiang, Kui Jiang, Xianming Liu, Liqiang Nie
{"title":"DSwinIR: Rethinking Window-Based Attention for Image Restoration","authors":"Gang Wu, Junjun Jiang, Kui Jiang, Xianming Liu, Liqiang Nie","doi":"10.1109/tpami.2025.3646016","DOIUrl":"https://doi.org/10.1109/tpami.2025.3646016","url":null,"abstract":"","PeriodicalId":13426,"journal":{"name":"IEEE Transactions on Pattern Analysis and Machine Intelligence","volume":"171 1","pages":""},"PeriodicalIF":23.6,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Federated Learning with Non-IID Data: Challenges, Trends, and Future Opportunities 非iid数据的分散联邦学习:挑战、趋势和未来机遇
IF 16.6 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-19 DOI: 10.1145/3785657
Wu-Chun Chung, Chao-Ai Lo, Yan-Hui Lin, Zhi-Hao Chen, Che-Lun Hung
As artificial intelligence and machine learning advance, increasing privacy concerns and regulatory constraints have limited cross-border data sharing for traditional model training. Federated Learning (FL) offers a privacy-preserving approach by enabling distributed training without exposing raw data. However, FL faces significant challenges, particularly when dealing with Non-Independent and Identically Distributed (Non-IID) data, which results in inconsistent model performance. Moreover, relying on a central server also raises reliability and scalability issues. Decentralized Federated Learning (DFL) eliminates the central server, thereby fostering more robust and scalable collaboration. Despite the growing interest in DFL, a comprehensive review focusing on Non-IID challenges remains scarce. This article presents a Systematic Literature Review (SLR) of existing research on DFL under Non-IID settings. Studies were retrieved from six major academic publishers and categorized into four pillars: architecture, topology, optimization, and security. The SLR review provides insights into current trends and systematically summarizes real-world applications, commonly used datasets, and neural network models. This article also examines prevalent methods for conducting Non-IID experiments and evaluating performance metrics. By providing a structured analysis of the literature, experimental setups, and evaluation practices, this survey highlights key trends, uncovers research gaps, and proposes future directions for advancing DFL in Non-IID environments.
随着人工智能和机器学习的发展,越来越多的隐私问题和监管约束限制了传统模型训练的跨境数据共享。联邦学习(FL)通过支持分布式训练而不暴露原始数据,提供了一种保护隐私的方法。然而,FL面临着巨大的挑战,特别是在处理非独立和同分布(Non-IID)数据时,这会导致模型性能不一致。此外,依赖中央服务器还会带来可靠性和可伸缩性问题。分散的联邦学习(DFL)消除了中央服务器,从而促进了更健壮和可伸缩的协作。尽管对DFL的兴趣越来越大,但对非iid挑战的全面审查仍然很少。本文对非iid环境下DFL的现有研究进行了系统的文献综述。研究从六个主要的学术出版商中检索,并分为四大支柱:架构、拓扑、优化和安全性。SLR综述提供了对当前趋势的见解,并系统地总结了实际应用、常用数据集和神经网络模型。本文还研究了进行非iid实验和评估性能指标的流行方法。通过对文献、实验设置和评估实践进行结构化分析,本调查突出了关键趋势,揭示了研究差距,并提出了在非iid环境中推进DFL的未来方向。
{"title":"Decentralized Federated Learning with Non-IID Data: Challenges, Trends, and Future Opportunities","authors":"Wu-Chun Chung, Chao-Ai Lo, Yan-Hui Lin, Zhi-Hao Chen, Che-Lun Hung","doi":"10.1145/3785657","DOIUrl":"https://doi.org/10.1145/3785657","url":null,"abstract":"As artificial intelligence and machine learning advance, increasing privacy concerns and regulatory constraints have limited cross-border data sharing for traditional model training. Federated Learning (FL) offers a privacy-preserving approach by enabling distributed training without exposing raw data. However, FL faces significant challenges, particularly when dealing with Non-Independent and Identically Distributed (Non-IID) data, which results in inconsistent model performance. Moreover, relying on a central server also raises reliability and scalability issues. Decentralized Federated Learning (DFL) eliminates the central server, thereby fostering more robust and scalable collaboration. Despite the growing interest in DFL, a comprehensive review focusing on Non-IID challenges remains scarce. This article presents a Systematic Literature Review (SLR) of existing research on DFL under Non-IID settings. Studies were retrieved from six major academic publishers and categorized into four pillars: architecture, topology, optimization, and security. The SLR review provides insights into current trends and systematically summarizes real-world applications, commonly used datasets, and neural network models. This article also examines prevalent methods for conducting Non-IID experiments and evaluating performance metrics. By providing a structured analysis of the literature, experimental setups, and evaluation practices, this survey highlights key trends, uncovers research gaps, and proposes future directions for advancing DFL in Non-IID environments.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"56 1","pages":""},"PeriodicalIF":16.6,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applications of flow-augmentation 流量增强的应用
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-19 DOI: 10.1016/j.cosrev.2025.100869
Stefan Kratsch, Marcin Pilipczuk, Roohani Sharma, Magnus Wahlström
{"title":"Applications of flow-augmentation","authors":"Stefan Kratsch, Marcin Pilipczuk, Roohani Sharma, Magnus Wahlström","doi":"10.1016/j.cosrev.2025.100869","DOIUrl":"https://doi.org/10.1016/j.cosrev.2025.100869","url":null,"abstract":"","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"2 1","pages":""},"PeriodicalIF":12.9,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space-O-RAN: Enabling Intelligent, Open, and Interoperable Non Terrestrial Networks in 6G 空间- o - ran:在6G中实现智能、开放和可互操作的非地面网络
IF 11.2 2区 计算机科学 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-12-19 DOI: 10.1109/mcom.001.2500080
Eduardo Baena, Paolo Testolina, Michele Polese, Dimitrios Koutsonikolas, Josep Jornet, Tommaso Melodia
{"title":"Space-O-RAN: Enabling Intelligent, Open, and Interoperable Non Terrestrial Networks in 6G","authors":"Eduardo Baena, Paolo Testolina, Michele Polese, Dimitrios Koutsonikolas, Josep Jornet, Tommaso Melodia","doi":"10.1109/mcom.001.2500080","DOIUrl":"https://doi.org/10.1109/mcom.001.2500080","url":null,"abstract":"","PeriodicalId":55030,"journal":{"name":"IEEE Communications Magazine","volume":"28 1","pages":""},"PeriodicalIF":11.2,"publicationDate":"2025-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145785588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
全部 J. Field Rob. J. Bionic Eng. ACTA INFORM Adv. Rob. AI MAG Ann. Math. Artif. Intell. Appl. Bionics Biomech. APPL INTELL APPL COMPUT ELECTROM APPL ARTIF INTELL Artif. Intell. ARTIF INTELL REV CHEMOMETR INTELL LAB China Commun. CMC-Comput. Mater. Continua Complex Intell. Syst. Comput. Sci. Eng. Commun. ACM COMPUTER Comput. Graphics Forum COMPUTING EMPIR SOFTW ENG Enterp. Inf. Syst. EPJ Data Sci. ETRI J EURASIP J WIREL COMM Evolving Systems FORM METHOD SYST DES Front. Neurorob. FRONT COMPUT SCI-CHI IEEE Trans. Commun. IEEE Trans. Comput. Social Syst. IEEE Trans. Dependable Secure Comput. IEEE Trans. Green Commun. Networking IEEE Trans. Cognit. Commun. Networking IEEE Access IEEE Trans. Comput. IEEE Antennas Propag. Mag. IEEE Micro IEEE Trans. Antennas Propag. IEEE Trans. Control Syst. Technol. IEEE Trans. Big Data IEEE Trans. Cybern. IEEE Internet Comput. IEEE Trans. Affective Comput. IEEE Trans. Emerging Top. Comput. Intell. IEEE SECUR PRIV IEEE Trans. Emerging Top. Comput. IEEE Trans. Aerosp. Electron. Syst. IEEE Trans. Broadcast. IEEE Intell. Syst. IEEE Commun. Lett. IEEE Trans. Autom. Control IEEE Trans. Cloud Comput. IEEE Trans. Evol. Comput. IEEE Trans. Consum. Electron. IEEE Trans. Fuzzy Syst. IEEE Trans. Haptic IEEE Trans. Image Process. IEEE Multimedia IEEE Rob. Autom. Lett. IEEE J. Sel. Areas Commun. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. IETE Tech. Rev. IEEE Trans. Serv. Comput. IEEE Trans. Parallel Distrib. Syst. IEEE Trans. Sustainable Comput. IEEE Trans. Multimedia IEEE Trans. Ind. Inf. IEEE Trans. Neural Networks Learn. Syst. IEEE Trans. Software Eng. IEEE-ACM T AUDIO SPE IEEE Wireless Commun. IEEE Wireless Commun. Lett. IET MICROW ANTENNA P IEEE Trans. Visual Comput. Graphics IEEE Trans. Ind. Electron. IET Optoelectron IEEE Trans. Veh. Technol. IEEE Trans. Netw. Serv. Manage. IEEE Trans. Pattern Anal. Mach. Intell. IEEE Trans. Wireless Commun. IEEE ACM T NETWORK IEEE Trans. Inf. Forensics Secur. IEEE Trans. Inf. Theory IEEE Trans. Knowl. Data Eng. INFORM SYST FRONT INFORMS J COMPUT INFOR Int. J. Comput. Vision Int. J. Approximate Reasoning Int. J. Control Int. J. Commun. Syst. Int. J. Imaging Syst. Technol. Int. J. Fuzzy Syst. Int. J. Intell. Syst. Int. J. Network Manage. Int. J. Parallel Program. Int. J. Social Rob. Int. J. Software Tools Technol. Trans.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1