Showing 4,941 - 4,960 results of 21,428 for search '"computing"', query time: 0.08s Refine Results
  1. 4941
  2. 4942
  3. 4943

    Analysis of Average Shortest-Path Length of Scale-Free Network by Guoyong Mao, Ning Zhang

    Published 2013-01-01
    “…Computing the average shortest-path length of a large scale-free network needs much memory space and computation time. …”
    Get full text
    Article
  4. 4944

    Construction of marginally coupled designs with mixed-level qualitative factors by Weiping Zhou, Wan He, Wei Wang, Shigui Huang

    Published 2024-11-01
    “…Marginally coupled designs (MCDs) with more economical run sizes than sliced Latin hypercube designs were widely used in computer experiments with both quantitative and qualitative factors. …”
    Get full text
    Article
  5. 4945
  6. 4946
  7. 4947
  8. 4948

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…EdgeGuard uses edge computing to improve system scalability and efficiency by offloading computational tasks from IoMT devices with limited resources. …”
    Get full text
    Article
  9. 4949

    Efficient Probabilistic and Geometric Anatomical Mapping Using Particle Mesh Approximation on GPUs by Linh Ha, Marcel Prastawa, Guido Gerig, John H. Gilmore, Cláudio T. Silva, Sarang Joshi

    Published 2011-01-01
    “…Second, it involves the expensive computation of nonlinear deformations with high degrees of freedom. …”
    Get full text
    Article
  10. 4950
  11. 4951
  12. 4952

    Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service by Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang

    Published 2019-04-01
    “…Compared with existing accountable ciphertext-policy attribute-based encryption schemes, the proposed scheme is more practical from the two aspects: (1) a user can normally request for a decryption key along with a short signature, and no additional interaction between users and authorities is needed; and (2) the complexity of tracing a masked secret key is reduced to | U | exponent computation, where | U | denotes the number of users in the system. …”
    Get full text
    Article
  13. 4953

    Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors. by Bamwine, Delik

    Published 2024
    “…On one hand, the advent of modern high-performance computing architectures with increasing computing power has greatly enhanced our capability to deal with a large volume of data. …”
    Get full text
    Thesis
  14. 4954
  15. 4955
  16. 4956

    Implementation of an Innovative Method to Design Reflectarray Antennas by Abdelhamid Tayebi, Josefa Gómez, Iván González, Felipe Cátedra

    Published 2012-01-01
    “…A novel computed aided technique for designing reflectarray antennas is presented. …”
    Get full text
    Article
  17. 4957
  18. 4958
  19. 4959
  20. 4960

    Implementation of finite state logic machines via the dynamics of atomic systems by Dawit Hiluf Hailu

    Published 2025-02-01
    “…Following the success of Moore’s predictions, we are approaching a limit in the miniaturization of semiconductors for computing materials. This has led to the exploration of various research paths in search of alternative computing paradigms, such as quantum computing, 3D transistors, molecular logic, and continuous logic. …”
    Get full text
    Article