Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
121
Research on deterministic computing power network
Published 2022-10-01Subjects: “…computing-network convergence…”
Get full text
Article -
122
-
123
Guaranteeing service availability in cloud computing
Published 2014-02-01Subjects: “…cloud computing…”
Get full text
Article -
124
-
125
AUTOMATION OF INVENTORY PROCESS OF PERSONAL COMPUTERS
Published 2013-11-01“…The modern information infrastructure of a large or medium-sized enterprise is inconceivable without an effective system of the computer equipment and fictitious assets inventory. …”
Get full text
Article -
126
Variations of one computational geometry problem
Published 2004-12-01“…The paper tries to reveal possible stages of development which lead from the original idea to the final formulation of the problem. The computational geometry task Rectangles, used in Baltic Olympiad in Informatics' 2004 is taken as an example. …”
Get full text
Article -
127
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
128
Accurate Assessment of Computed Order Tracking
Published 2006-01-01“…We have studied the computed order tracking (COT), and a new computed procedure is proposed for solving the indeterminate results generated by the traditional method at constant speed. …”
Get full text
Article -
129
On Computation of Entropy of Hex-Derived Network
Published 2021-01-01“…In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1n and HDN 2n, respectively of order n. We also compute some degree-based entropies such as Randić, ABC, and GA entropy of HDN 1n and HDN 2n.…”
Get full text
Article -
130
Trusted Computing Strengthens Cloud Authentication
Published 2014-01-01“…Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. …”
Get full text
Article -
131
Introduction to Grassmann manifolds and quantum computation
Published 2002-01-01“…Geometrical aspects of quantum computing are reviewed elementarily for nonexperts and/or graduate students who are interested in both geometry and quantum computation. …”
Get full text
Article -
132
Robust Clustering Using Hyperdimensional Computing
Published 2024-01-01Subjects: “…Hyperdimensional computing (HDC)…”
Get full text
Article -
133
Computational Model of Recommender System Intervention
Published 2022-01-01“…Applied Computational Intelligence and Soft Computing…”
Get full text
Article -
134
COMPUTATIONAL NEUROSCIENCE FOR ADVANCING ARTIFICIAL INTELLIGENCE
Published 2011-01-01Get full text
Article -
135
-
136
Data Security and Privacy in Cloud Computing
Published 2014-07-01“…Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. …”
Get full text
Article -
137
Computational Tools for Cohomology of Toric Varieties
Published 2011-01-01“…Novel nonstandard techniques for the computation of cohomology classes on toric varieties are summarized. …”
Get full text
Article -
138
-
139
Quantum computing for extracting nuclear resonances
Published 2025-01-01Subjects: “…Quantum computing…”
Get full text
Article -
140
Computation of Topological Indices of NEPS of Graphs
Published 2021-01-01“…In this analysis, degree-related topological indices have a significant place in nanotechnology and theoretical chemistry. Thereby, the computation of indices is one of the successful branches of research. …”
Get full text
Article