Showing 361 - 380 results of 21,428 for search '"computational"', query time: 0.08s Refine Results
  1. 361

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. …”
    Get full text
    Article
  2. 362

    Two-Point Left Ventricle Pacing and Cardiac Computed Tomography by Rafal Mlynarski, Agnieszka Mlynarska, Eugeniusz Pilat, Rafal Gardas, Jacek Wilczek, Maciej Sosnowski

    Published 2012-01-01
    “…Endocardial leads can potentially cause problems during coronary vessels visualization in multislice computed tomography (MSCT) due to a large number of artifacts. …”
    Get full text
    Article
  3. 363
  4. 364
  5. 365
  6. 366
  7. 367
  8. 368
  9. 369

    Scheme Analysis for Enhancing Autonomous Driving Based on Computer Vision by Chen Xinyi, Luo Binbin, Xu Ziyue

    Published 2025-01-01
    “…This article explores the application and challenges of computer vision technology in autonomous driving, a critical component for the advancement of this field. …”
    Get full text
    Article
  10. 370

    Exact Computations in Topological Abelian Chern-Simons and BF Theories by Philippe Mathieu

    Published 2017-01-01
    “…We show how the structure of Deligne cohomology classes provides a way to perform exact (nonperturbative) computations in U1 Chern-Simons theory (BF theory, resp.) at the level of functional integrals. …”
    Get full text
    Article
  11. 371
  12. 372
  13. 373

    An Implementation of Lipschitz Simple Functions in Computer Algebra System Singular by Yanan Liu, Muhammad Ahsan Binyamin, Adnan Aslam, Minahal Arshad, Chengmei Fan, Hassan Mahmood, Jia-Bao Liu

    Published 2021-01-01
    “…The aim of this article is to implement a classifier in terms of easy computable invariants to compute the type of the Lipschitz simple function germs without computing the normal form in the computer algebra system Singular.…”
    Get full text
    Article
  14. 374
  15. 375
  16. 376

    Optimal Management of Computer Network Security in the Era of Big Data by Minfeng Chen

    Published 2022-01-01
    “…Journal of Computer Networks and Communications…”
    Get full text
    Article
  17. 377
  18. 378

    Online auction-based resource scheduling in grid computing networks by Lili Ding, Long Chang, Lei Wang

    Published 2016-10-01
    “…The aim of this article is to introduce a novel auction-based algorithm for grid computing wireless networks and resolve some incompetence with dynamic mechanisms. …”
    Get full text
    Article
  19. 379
  20. 380