Showing 101 - 120 results of 28,739 for search '"computing"', query time: 0.06s Refine Results
  1. 101

    Study on Cloud Computing Billing Issues by Hao Chen, Ye Tao, Ni Zhang, Yunyong Zhang

    Published 2014-11-01
    Subjects: “…cloud computing…”
    Get full text
    Article
  2. 102
  3. 103

    Computing some Laplacian Coefficients of Forests by Ali Ghalavand, Ali Reza Ashrafi

    Published 2022-01-01
    “…In an earlier paper, the coefficients cn−4 and cn−5 for forests with respect to some degree-based graph invariants were computed. The aim of this paper is to continue this work by giving an exact formula for the coefficient cn−6.…”
    Get full text
    Article
  4. 104
  5. 105
  6. 106

    Research on deterministic computing power network by Qingmin JIA, Yujiao HU, Huayu ZHANG, Kailai PENG, Pingping CHEN, Renchao XIE, Tao HUANG

    Published 2022-10-01
    Subjects: “…computing-network convergence…”
    Get full text
    Article
  7. 107

    Usage of computer algebra in teaching process by Aleksas Domarkas, Gintautas Misevičius, Violeta Pakalnytė, Albertas Pincevičius, Rimantas-Jonas Rakauskas

    Published 1998-12-01
    “… This work was intended to motivate the necessity of intensive training of mathematics utilising the computer algebra MAPLE in Lithuanian Military Academy. …”
    Get full text
    Article
  8. 108
  9. 109

    Development of dependable embedded computer systems by De-qi KONG, Ya-hui LI, Peng GUO

    Published 2013-08-01
    Subjects: “…embedded computer…”
    Get full text
    Article
  10. 110
  11. 111
  12. 112

    AUTOMATION OF INVENTORY PROCESS OF PERSONAL COMPUTERS by A. I. Zaharenko, A. V. Vashetin

    Published 2013-11-01
    “…The modern information infrastructure of a large or medium-sized enterprise is inconceivable without an effective system of the computer equipment and fictitious assets inventory. …”
    Get full text
    Article
  13. 113

    Variations of one computational geometry problem by Jūratė Skūpienė

    Published 2004-12-01
    “…The paper tries to reveal possible stages of development which lead from the original idea to the final formulation of the problem. The computational geometry task Rectangles, used in Baltic Olympiad in Informatics' 2004 is taken as an example. …”
    Get full text
    Article
  14. 114
  15. 115

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  16. 116

    Accurate Assessment of Computed Order Tracking by P.N. Saavedra, C.G. Rodriguez

    Published 2006-01-01
    “…We have studied the computed order tracking (COT), and a new computed procedure is proposed for solving the indeterminate results generated by the traditional method at constant speed. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119

    On Computation of Entropy of Hex-Derived Network by Pingping Song, Haidar Ali, Muhammad Ahsan Binyamin, Bilal Ali, Jia-Bao Liu

    Published 2021-01-01
    “…In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1n and HDN 2n, respectively of order n. We also compute some degree-based entropies such as Randić, ABC, and GA entropy of HDN 1n and HDN 2n.…”
    Get full text
    Article
  20. 120

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. …”
    Get full text
    Article