Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
381
Computing Exponential for Iterative Splitting Methods: Algorithms and Applications
Published 2011-01-01“…Iterative splitting methods have a huge amount to compute matrix exponential. Here, the acceleration and recovering of higher-order schemes can be achieved. …”
Get full text
Article -
382
Research on the method of virtual machine deployment in cloud computing
Published 2015-03-01Get full text
Article -
383
Computational Swarming: A Cultural Technique for Generative Architecture
Published 2014-11-01“…As a major, zoo-technological branch of ABM, Computational Swarm Intelligence (SI) coalesces all kinds of architectural elements – materials, people, environmental forces, traffic dynamics, etc. – into a collective population. …”
Get full text
Article -
384
Design of video recommender system based on cloud computing
Published 2013-09-01Subjects: Get full text
Article -
385
A Review of Computational Electromagnetic Methods for Graphene Modeling
Published 2016-01-01“…In this paper, a review of application of graphene in electronic and photonic device is provided, as well as some widely used computational electromagnetic algorithms for graphene modeling. …”
Get full text
Article -
386
Peculiarities of rendering of material in virtual computers' network course
Published 2004-12-01“… Problems of singling out the most important themes of distance computers' network course are analyzed in the present article. …”
Get full text
Article -
387
Trust-driven job scheduling heuristics for computing grid
Published 2006-01-01Subjects: “…grid computing…”
Get full text
Article -
388
Computational thinking for young indigenous learners in New Zealand
Published 2024-06-01Subjects: Get full text
Article -
389
Theoretical and Computational Advances in Nonlinear Dynamical Systems 2018
Published 2018-01-01Get full text
Article -
390
Network Restoration for Next-Generation Communication and Computing Networks
Published 2018-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
391
Trusted secure model for data services in cloud computing
Published 2014-10-01“…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
Get full text
Article -
392
Efficient algorithm for computing Walsh spectrum and differential probability
Published 2015-05-01“…According to the characteristic of T-functions,along with the definition of narrow T-functions,the linear prop-erty and differential property were studied.Markov chain and transition matrices were constructed to propose fast algo-rithm for computing Walsh spectrum and differential probability,of which the time complexity is O(n).In addition,the algorithm is applied in the T-functions in TSC-family and finally the result expression is given.…”
Get full text
Article -
393
Computing on the joint quadratic complexity of multiple periodic sequences
Published 2012-06-01“…An algorithm for determining the joint quadratic complexity of the prescribed multiple periodic sequences over any finite field was presented by using the algorithm for computing the quadratic complexity of the prescribed single sequence proposed by Rizomiliotis and the methods for determining the solutions of the linear equations.The total processing time requirement is cubics function of the sequence length at most.…”
Get full text
Article -
394
Critical considerations and computational tools in plant genome editing
Published 2025-01-01Subjects: “…Computational tools…”
Get full text
Article -
395
Efficient and configurable data transport protocol for grid computing
Published 2007-01-01Subjects: “…grid computing…”
Get full text
Article -
396
GuardianMPC: Backdoor-Resilient Neural Network Computation
Published 2025-01-01Subjects: Get full text
Article -
397
Autonomous computing and network convergence:architecture, technologies, and prospects
Published 2023-12-01“…In view of the new service scenarios and the demand for high intelligence network in computing and network convergence (CNC), the concept of autonomous CNC (Auto-CNC) is elaborated, where intelligence was introduced into all the aspects of CNC, including resource integration, process automation, and system intelligence.The current research directions and remaining challenges of CNC were introduced, and three key features, i.e., intent-driven computing network, the autonomous system operation and the adaptive co-evolution of communication, computing intelligence, were summarized from the proposed Auto-CNC.Meanwhile, the reference architecture and key technologies of Auto-CNC were described, which were followed by several preliminary exploration cases.Finally, future research trends and technical advice were discussed and recommended.…”
Get full text
Article -
398
Research on the Cloud Computing in Online Charging System Application
Published 2013-10-01Subjects: “…cloud computing…”
Get full text
Article -
399
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…Cloud computing and Internet of Things (IoT) are emerging technologies that have experienced rapid development in recent years. …”
Get full text
Article -
400
Volumetric Denoising of XCT Data Using Quantum Computing
Published 2025-02-01“… Quantum computing is an emerging field of technology that utilizes unique properties such as the superposition principle and quantum entanglement, potentially enabling the development of techniques that are drastically faster or even the only feasible solutions compared to classical approaches. …”
Get full text
Article