Showing 121 - 140 results of 28,739 for search '"computer"', query time: 0.08s Refine Results
  1. 121

    Research on deterministic computing power network by Qingmin JIA, Yujiao HU, Huayu ZHANG, Kailai PENG, Pingping CHEN, Renchao XIE, Tao HUANG

    Published 2022-10-01
    Subjects: “…computing-network convergence…”
    Get full text
    Article
  2. 122
  3. 123
  4. 124
  5. 125

    AUTOMATION OF INVENTORY PROCESS OF PERSONAL COMPUTERS by A. I. Zaharenko, A. V. Vashetin

    Published 2013-11-01
    “…The modern information infrastructure of a large or medium-sized enterprise is inconceivable without an effective system of the computer equipment and fictitious assets inventory. …”
    Get full text
    Article
  6. 126

    Variations of one computational geometry problem by Jūratė Skūpienė

    Published 2004-12-01
    “…The paper tries to reveal possible stages of development which lead from the original idea to the final formulation of the problem. The computational geometry task Rectangles, used in Baltic Olympiad in Informatics' 2004 is taken as an example. …”
    Get full text
    Article
  7. 127

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  8. 128

    Accurate Assessment of Computed Order Tracking by P.N. Saavedra, C.G. Rodriguez

    Published 2006-01-01
    “…We have studied the computed order tracking (COT), and a new computed procedure is proposed for solving the indeterminate results generated by the traditional method at constant speed. …”
    Get full text
    Article
  9. 129

    On Computation of Entropy of Hex-Derived Network by Pingping Song, Haidar Ali, Muhammad Ahsan Binyamin, Bilal Ali, Jia-Bao Liu

    Published 2021-01-01
    “…In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1n and HDN 2n, respectively of order n. We also compute some degree-based entropies such as Randić, ABC, and GA entropy of HDN 1n and HDN 2n.…”
    Get full text
    Article
  10. 130

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. …”
    Get full text
    Article
  11. 131

    Introduction to Grassmann manifolds and quantum computation by Kazuyuki Fujii

    Published 2002-01-01
    “…Geometrical aspects of quantum computing are reviewed elementarily for nonexperts and/or graduate students who are interested in both geometry and quantum computation. …”
    Get full text
    Article
  12. 132

    Robust Clustering Using Hyperdimensional Computing by Lulu Ge, Keshab K. Parhi

    Published 2024-01-01
    Subjects: “…Hyperdimensional computing (HDC)…”
    Get full text
    Article
  13. 133
  14. 134
  15. 135
  16. 136

    Data Security and Privacy in Cloud Computing by Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu

    Published 2014-07-01
    “…Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. …”
    Get full text
    Article
  17. 137

    Computational Tools for Cohomology of Toric Varieties by Ralph Blumenhagen, Benjamin Jurke, Thorsten Rahn

    Published 2011-01-01
    “…Novel nonstandard techniques for the computation of cohomology classes on toric varieties are summarized. …”
    Get full text
    Article
  18. 138
  19. 139

    Quantum computing for extracting nuclear resonances by Hantao Zhang, Dong Bai, Zhongzhou Ren

    Published 2025-01-01
    Subjects: “…Quantum computing…”
    Get full text
    Article
  20. 140

    Computation of Topological Indices of NEPS of Graphs by Muhammad Imran, Shehnaz Akhter, Muhammad Kamran Jamil

    Published 2021-01-01
    “…In this analysis, degree-related topological indices have a significant place in nanotechnology and theoretical chemistry. Thereby, the computation of indices is one of the successful branches of research. …”
    Get full text
    Article