Showing 4,961 - 4,980 results of 21,428 for search '"computing"', query time: 0.07s Refine Results
  1. 4961
  2. 4962
  3. 4963

    Minor Prime Factorization for n-D Polynomial Matrices over Arbitrary Coefficient Field by Jinwang Liu, Dongmei Li, Licui Zheng

    Published 2018-01-01
    “…Two tractable criterions are presented for the existence of minor prime factorization, which can be realized by programming and complexity computations. On the theory and application, we shall obtain some new and interesting results, giving some constructive computational methods for carrying out the minor prime factorization.…”
    Get full text
    Article
  4. 4964

    A Variable Precision Covering-Based Rough Set Model Based on Functions by Yanqing Zhu, William Zhu

    Published 2014-01-01
    “…Classical rough set theory is a technique of granular computing for handling the uncertainty, vagueness, and granularity in information systems. …”
    Get full text
    Article
  5. 4965
  6. 4966
  7. 4967
  8. 4968
  9. 4969
  10. 4970
  11. 4971
  12. 4972
  13. 4973

    Towards Physarum Engines by Soichiro Tsuda, Jeff Jones, Andrew Adamatzky

    Published 2012-01-01
    “…Physarum may be considered as a smart computing and actuating material since both its motor and control systems are distributed within its undifferentiated tissue and can survive trauma such as excision, fission and fusion of plasmodia. …”
    Get full text
    Article
  14. 4974
  15. 4975
  16. 4976

    A New MPPT Technique for Fast and Efficient Tracking under Fast Varying Solar Irradiation and Load Resistance by Libin Xu, Ruofa Cheng, Jiajing Yang

    Published 2020-01-01
    “…It consists of two stages: (1) the computing stage and (2) the regulating stage. The computing stage includes the coarse positioning operation and fine positioning operation. …”
    Get full text
    Article
  17. 4977

    Performance Evaluation of NewSQL Databases in a Distributed Architecture by Zhiyao Zhang, Alan Megargel, Lingxiao Jiang

    Published 2025-01-01
    “…Distributed architectures and cloud computing has enabled businesses to scale their application components across different geographical locations. …”
    Get full text
    Article
  18. 4978

    Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates by Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso

    Published 2024-01-01
    “…The emergence of cloud computing enables users to upload data to remote clouds and compute them. …”
    Get full text
    Article
  19. 4979
  20. 4980

    Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism by Kai Zhang, Pei-Wei Tsai, Jiao Tian, Wenyu Zhao, Xinyi Cai, Longxiang Gao, Jinjun Chen

    Published 2024-09-01
    “…Differential Privacy (DP) stands as a secure and efficient mechanism for privacy preservation, offering enhanced data utility without compromising computational complexity. Its adaptability is evidenced by its integration into blockchain-based Internet of Things (IoT) contexts, including smart wearables, smart homes, etc. …”
    Get full text
    Article