Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
181
Research on continuous monitoring of cloud computing service
Published 2016-10-01Subjects: “…cloud computing…”
Get full text
Article -
182
Hybrid data synchronization mechanism for mobile computing
Published 2016-08-01Subjects: “…mobile computing…”
Get full text
Article -
183
Survey on Data Center Network for Cloud Computing
Published 2014-02-01“…Data center network has faced several challenges from the arising of cloud computing.Along with the continuous expansive bandwidth requirements,data center network also should provide network isolation and service guarantee for each tenant.Current researches focued on the physical network,network virtualization and service guarantee were introduced.…”
Get full text
Article -
184
On the computation of the class numbers of some cubic fields
Published 1986-01-01Get full text
Article -
185
Backtesting Quantum Computing Algorithms for Portfolio Optimization
Published 2024-01-01Subjects: Get full text
Article -
186
On the Computation of the Efficient Frontier of the Portfolio Selection Problem
Published 2012-01-01“…An easy-to-use procedure is presented for improving the ε-constraint method for computing the efficient frontier of the portfolio selection problem endowed with additional cardinality and semicontinuous variable constraints. …”
Get full text
Article -
187
Password authentication scheme for mobile computing environment
Published 2007-01-01“…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
Get full text
Article -
188
Fast Computation of Singular Oscillatory Fourier Transforms
Published 2014-01-01“…Based on substituting the original interval of integration by the paths of steepest descent, if f is analytic in the complex region G containing [a, b], the computation of integrals can be transformed into the problems of integrating two integrals on [0, ∞) with the integrand that does not oscillate and decays exponentially fast, which can be efficiently computed by using the generalized Gauss Laguerre quadrature rule. …”
Get full text
Article -
189
Remote Satellites Computing transmission and Key Technologies
Published 2022-06-01Subjects: “…computing transmission…”
Get full text
Article -
190
Service migration of heterogeneous cloud computing platform
Published 2020-12-01Subjects: “…cloud computing…”
Get full text
Article -
191
Computational Algebraic Geometry in String and Gauge Theory
Published 2012-01-01Get full text
Article -
192
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
193
Novel kernel function for computing the similarity of text
Published 2012-12-01“…To enhance the performance of detecting similar documents,a novel kernel function named S_Wang kernel was constructed.Based on the actual situation of computing text similarity,the S_Wang kernel was newly bu lt with consideration of the Euclidean distance and angle between vectors that represented the text documents to be compared.It was proved that the function could be constructed as a kernel function according to Mercer theorem.Experimental verification of the performance of the kernels in the text document similarity calculation was provided.The results show that the S_Wang kernel is significantly better than the precision and F1 performance of other kernels like Cauchy kernel,Latent Semantic Kernel (LSK) and CLA kernel.S_Wang kernel is suitable for text similarity computation.…”
Get full text
Article -
194
-
195
Analytical Computation of Information Rate for MIMO Channels
Published 2017-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
196
Private-preserving scientific computation of the rational numbers
Published 2022-06-01Subjects: “…secure multiparty computation…”
Get full text
Article -
197
Constructing fair-exchange protocols for cloud computing
Published 2013-03-01Subjects: “…cloud computing…”
Get full text
Article -
198
Survey on open source edge computing platforms
Published 2021-04-01Subjects: “…edge computing…”
Get full text
Article -
199
Privacy-preserving image processing in cloud computing
Published 2016-01-01Subjects: “…cloud computing…”
Get full text
Article -
200
Computing Topological Indices and Polynomials of the Rhenium Trioxide
Published 2022-01-01“…These topological indices are used to model quantitative structure relationships QSARs, which are connections between the work of biological or other molecular structures and the chemical structures. This study computed the first, second, and Hyper Zagreb indices, as well as Zagreb polynomials, Redefined Zagreb indices, Randic index, ABC index, and GA index of chemical structure of Rhenium Trioxide.…”
Get full text
Article