2023
DOI: 10.1002/ett.4746
|View full text |Cite
|
Sign up to set email alerts
|

Jitter‐sensitive data communication in emerging wireless networks

Abstract: Jitter and time-sensitive communications (TSC) will play an important role as part of the emerging wireless networks such as fifth-generation (5G) and sixth-generation (6G) cellular networks to enable applications including vehicle-to-everything (V2X), real-time audio/video, real-time industrial automation and control, and synchronized collaboration. TSC is characterized by stringent latency, jitter, and reliability requirements. This paper considers the problem of scheduling time-sensitive data packets with s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…In addition, current sensitive data identification methods do not take into account the application scenarios of data-efficient transmission technology. [1][2][3][4][5][6] This paper proposes a sensitive data identification method based on batch data and streaming data for the problem of identifying sensitive data in multiple categories and scenarios within Beike Inc. To mitigate the problems posed by the size and complexity of the data, this method further divides data into incremental data, stock data, structured data, semi-structured and unstructured data, then uses different sensitive data identification government schemes respectively. In addition, the method constructs a classification & annotation platform and a dataset management platform to provide a reference for the definition and classification of sensitive data, therefore further supporting the training and evaluation of machine learning models for sensitive data identification.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, current sensitive data identification methods do not take into account the application scenarios of data-efficient transmission technology. [1][2][3][4][5][6] This paper proposes a sensitive data identification method based on batch data and streaming data for the problem of identifying sensitive data in multiple categories and scenarios within Beike Inc. To mitigate the problems posed by the size and complexity of the data, this method further divides data into incremental data, stock data, structured data, semi-structured and unstructured data, then uses different sensitive data identification government schemes respectively. In addition, the method constructs a classification & annotation platform and a dataset management platform to provide a reference for the definition and classification of sensitive data, therefore further supporting the training and evaluation of machine learning models for sensitive data identification.…”
Section: Introductionmentioning
confidence: 99%
“…It can be seen that the existing methods cannot meet the needs of enterprise‐level sensitive data identification. In addition, current sensitive data identification methods do not take into account the application scenarios of data‐efficient transmission technology 1–6 …”
Section: Introductionmentioning
confidence: 99%