Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1061
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
1062
-
1063
Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants
Published 2016-01-01“…Soft error caused by single event upset has been a severe challenge to aerospace-based computing. Silent data corruption (SDC) is one of the results incurred by soft error. …”
Get full text
Article -
1064
Retracted: Optimization of the Marketing Management System Based on Cloud Computing and Big Data
Published 2024-01-01Get full text
Article -
1065
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01Subjects: “…multi-access edge computing…”
Get full text
Article -
1066
Ultrafast silicon photonic reservoir computing engine delivering over 200 TOPS
Published 2024-12-01“…Abstract Reservoir computing (RC) is a powerful machine learning algorithm for information processing. …”
Get full text
Article -
1067
-
1068
Joint intelligent optimization of task offloading and service caching for vehicular edge computing
Published 2021-01-01Subjects: Get full text
Article -
1069
Utility-driven based co-allocation resource reservation strategy in computational grid
Published 2014-05-01Subjects: “…grid computing…”
Get full text
Article -
1070
Immune computing-based base station location planning in the TD-SCDMA network
Published 2011-01-01“…To reduce the cost of TD-SCDMA network construction,a solution of base station location planning problem based on immune computing was proposed.The difficulties of TD-SCDMA base station construction and the principle of location planning were expound,clonal multiplication operator,clonal mutation and clonal selection operator with real-number encoding were designed,the framework of immune memory clonal algorithm for base station location plan-ning problem was given,and simulation experiments were done to validate the proposed algorithm.Experimental result shows that the proposed solution can obtain higher network coverage rate with lower cost of network construction rela-tively,and has the advantage of good application value.…”
Get full text
Article -
1071
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing
Published 2025-01-01Subjects: Get full text
Article -
1072
Aware Computing in Spatial Language Understanding Guided by Cognitively Inspired Knowledge Representation
Published 2012-01-01“…Applied Computational Intelligence and Soft Computing…”
Get full text
Article -
1073
SIMULACIÓN DE UN MODELO DE EQUILIBRIO GENERAL COMPUTABLE PARA VENEZUELA
Published 2012-01-01Subjects: “…equilibrio general computable…”
Get full text
Article -
1074
A Novel Computational Method to Reduce Leaky Reaction in DNA Strand Displacement
Published 2015-01-01Get full text
Article -
1075
Quantum computational infusion in extreme learning machines for early multi-cancer detection
Published 2025-02-01Get full text
Article -
1076
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article -
1077
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
Published 2025-01-01Subjects: “…edge computing…”
Get full text
Article -
1078
Classification of Autism Disorder Severity Using Fuzzy Methods Based on Soft Computing
Published 2023-03-01Get full text
Article -
1079
A Computational Model of Peripheral Photocoagulation for the Prevention of Progressive Diabetic Capillary Occlusion
Published 2016-01-01“…We developed a computational model of the propagation of retinal ischemia in diabetic retinopathy and analyzed the consequences of various patterns and sizes of burns in peripheral retinal photocoagulation. …”
Get full text
Article -
1080
Impossibility Results for Byzantine-Tolerant State Observation, Synchronization, and Graph Computation Problems
Published 2025-01-01Subjects: Get full text
Article