Showing 361 - 380 results of 21,428 for search '"computing"', query time: 0.09s Refine Results
  1. 361
  2. 362

    Distributed Task Offloading Game in Multiserver Mobile Edge Computing Networks by Shuang Chen, Ying Chen, Xin Chen, Yuemei Hu

    Published 2020-01-01
    “…With the explosion of data traffic, mobile edge computing (MEC) has emerged to solve the problem of high time delay and energy consumption. …”
    Get full text
    Article
  3. 363
  4. 364

    A differential game model of intrusion detection system in cloud computing by Zhi Li, Haitao Xu, Yanzhu Liu

    Published 2017-01-01
    “…The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. …”
    Get full text
    Article
  5. 365

    Evaluation of the Fluctuation Mechanism of Behavioral Financial Market Based on Edge Computing by Xiaoliang Yuan

    Published 2022-01-01
    “…The research results showed that the behavioral financial market volatility mechanism based on edge computing constructed in this paper improved the predictability of financial market volatility by 15%.…”
    Get full text
    Article
  6. 366
  7. 367

    A Fast Algorithm for Computing Binomial Coefficients Modulo Powers of Two by Mugurel Ionut Andreica

    Published 2013-01-01
    “…I present a new algorithm for computing binomial coefficients modulo . The proposed method has an preprocessing time, after which a binomial coefficient with can be computed modulo in time. …”
    Get full text
    Article
  8. 368
  9. 369
  10. 370

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
    Get full text
    Article
  11. 371

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  12. 372
  13. 373

    Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach by Sanjukta Krishnagopal, Yiannis Aloimonos, Michelle Girvan

    Published 2018-01-01
    “…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
    Get full text
    Article
  14. 374
  15. 375
  16. 376

    Research on Risk Prediction Model of Internet Finance Based on Cloud Computing by Shuanbao Li, Xiaoyan Liu, Chengfei Li

    Published 2022-01-01
    “…With the rapid development of the Internet, the traditional Internet financial risk prediction methods can no longer meet the needs of individuals and enterprises, so the concept of cloud computing arises at the historic moment. Cloud computing has subverted the traditional financial risk prediction method and has been widely studied and applied for its distributed, dynamic and autonomous characteristics. …”
    Get full text
    Article
  17. 377

    Two-Cloud-Servers-Assisted Secure Outsourcing Multiparty Computation by Yi Sun, Qiaoyan Wen, Yudong Zhang, Hua Zhang, Zhengping Jin, Wenmin Li

    Published 2014-01-01
    “…We focus on how to securely outsource computation task to the cloud and propose a secure outsourcing multiparty computation protocol on lattice-based encrypted data in two-cloud-servers scenario. …”
    Get full text
    Article
  18. 378
  19. 379

    Computation of Graph Fourier Transform Centrality Using Graph Filter by Chien-Cheng Tseng, Su-Ling Lee

    Published 2024-01-01
    “…For conventional computation method, it needs to use the non-sparse transform matrix of graph Fourier transform (GFT) to compute GFTC scores. …”
    Get full text
    Article
  20. 380

    Simulating Smoke Filling in Big Halls by Computational Fluid Dynamics by W. K. Chow, C. L. Chow, S. S. Li

    Published 2011-01-01
    “…An update on applying Computational Fluid Dynamics (CFD) in smoke exhaust design will be presented in this paper. …”
    Get full text
    Article