Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
961
Assessing bias and computational efficiency in vision transformers using early exits
Published 2025-01-01“…We present an approach using the state of the art Vision Transformer and Early Exits for reducing compute budget without significantly affecting performance. …”
Get full text
Article -
962
A simplified computational liver perfusion model, with applications to organ preservation
Published 2025-01-01“…Additionally, we introduce the concept of a super lobule which enables a computational abstraction of biological liver lobules. …”
Get full text
Article -
963
Multi-camera video collaborative analysis method based on edge computing
Published 2023-08-01Subjects: “…edge computing…”
Get full text
Article -
964
Hybrid computational models for integrating clinical and molecular OSCC biomarker data
Published 2024-06-01Get full text
Article -
965
An Efficient Computation of Effective Ground Range Using an Oblate Earth Model
Published 2014-01-01Get full text
Article -
966
Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity
Published 2022-09-01Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
Get full text
Article -
967
Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment
Published 2021-01-01“…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
Get full text
Article -
968
Multi-Tier Blockchain-Based Land Registry Using Fog Computing
Published 2025-01-01Subjects: Get full text
Article -
969
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01“…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
Get full text
Article -
970
Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach
Published 2018-01-01“…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
Get full text
Article -
971
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01Subjects: “…compute first networking…”
Get full text
Article -
972
Second Mesiobuccal Canal Evaluation Features with Cone-Beam Computed Tomography
Published 2019-01-01Get full text
Article -
973
Modeling Short-Range Microwave Networks to Scale Superconducting Quantum Computation
Published 2025-01-01“…A core challenge for superconducting quantum computers is to scale up the number of qubits in each processor without increasing noise or cross-talk. …”
Get full text
Article -
974
Sigmoid Volvulus in Pregnancy Assessed by Contrast-Enhanced Computed Tomography Scanning
Published 2021-01-01Get full text
Article -
975
A computation offloading scheme for energy consumption optimization in Internet of vehicles
Published 2023-10-01Subjects: Get full text
Article -
976
Statistical and computational methods for enabling the clinical and translational application of spatial transcriptomics
Published 2024-12-01Subjects: “…Computational Methods…”
Get full text
Article -
977
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: “…cloud computing…”
Get full text
Article -
978
Adaptive Language Processing Based on Deep Learning in Cloud Computing Platform
Published 2020-01-01Get full text
Article -
979
Sensitivity Improvement of Optical Computed Tomography Scanners for Scanning Gel Dosimeters
Published 2025-01-01Subjects: “…Optical Computed Tomography…”
Get full text
Article -
980
Novel Techniques to Speed Up the Computation of the Automorphism Group of a Graph
Published 2014-01-01“…Graph automorphism (GA) is a classical problem, in which the objective is to compute the automorphism group of an input graph. …”
Get full text
Article