Showing 1,061 - 1,080 results of 28,739 for search '"computer"', query time: 0.10s Refine Results
  1. 1061
  2. 1062
  3. 1063

    Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants by Junchi Ma, Dengyun Yu, Yun Wang, Zhenbo Cai, Qingxiang Zhang, Cheng Hu

    Published 2016-01-01
    “…Soft error caused by single event upset has been a severe challenge to aerospace-based computing. Silent data corruption (SDC) is one of the results incurred by soft error. …”
    Get full text
    Article
  4. 1064
  5. 1065

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    Subjects: “…multi-access edge computing…”
    Get full text
    Article
  6. 1066

    Ultrafast silicon photonic reservoir computing engine delivering over 200 TOPS by Dongliang Wang, Yikun Nie, Gaolei Hu, Hon Ki Tsang, Chaoran Huang

    Published 2024-12-01
    “…Abstract Reservoir computing (RC) is a powerful machine learning algorithm for information processing. …”
    Get full text
    Article
  7. 1067
  8. 1068
  9. 1069
  10. 1070

    Immune computing-based base station location planning in the TD-SCDMA network by ZHU Si-feng1, LIU Fang1, CHAI Zheng-yi1

    Published 2011-01-01
    “…To reduce the cost of TD-SCDMA network construction,a solution of base station location planning problem based on immune computing was proposed.The difficulties of TD-SCDMA base station construction and the principle of location planning were expound,clonal multiplication operator,clonal mutation and clonal selection operator with real-number encoding were designed,the framework of immune memory clonal algorithm for base station location plan-ning problem was given,and simulation experiments were done to validate the proposed algorithm.Experimental result shows that the proposed solution can obtain higher network coverage rate with lower cost of network construction rela-tively,and has the advantage of good application value.…”
    Get full text
    Article
  11. 1071
  12. 1072

    Aware Computing in Spatial Language Understanding Guided by Cognitively Inspired Knowledge Representation by Masao Yokota

    Published 2012-01-01
    “…Applied Computational Intelligence and Soft Computing…”
    Get full text
    Article
  13. 1073
  14. 1074
  15. 1075
  16. 1076

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  17. 1077
  18. 1078
  19. 1079

    A Computational Model of Peripheral Photocoagulation for the Prevention of Progressive Diabetic Capillary Occlusion by Thomas J. Gast, Xiao Fu, John Scott Gens, James A. Glazier

    Published 2016-01-01
    “…We developed a computational model of the propagation of retinal ischemia in diabetic retinopathy and analyzed the consequences of various patterns and sizes of burns in peripheral retinal photocoagulation. …”
    Get full text
    Article
  20. 1080