Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
101
Study on Cloud Computing Billing Issues
Published 2014-11-01Subjects: “…cloud computing…”
Get full text
Article -
102
-
103
Computing some Laplacian Coefficients of Forests
Published 2022-01-01“…In an earlier paper, the coefficients cn−4 and cn−5 for forests with respect to some degree-based graph invariants were computed. The aim of this paper is to continue this work by giving an exact formula for the coefficient cn−6.…”
Get full text
Article -
104
-
105
Computational Intelligence and Metaheuristic Algorithms with Applications
Published 2014-01-01Get full text
Article -
106
Research on deterministic computing power network
Published 2022-10-01Subjects: “…computing-network convergence…”
Get full text
Article -
107
Usage of computer algebra in teaching process
Published 1998-12-01“… This work was intended to motivate the necessity of intensive training of mathematics utilising the computer algebra MAPLE in Lithuanian Military Academy. …”
Get full text
Article -
108
-
109
Development of dependable embedded computer systems
Published 2013-08-01Subjects: “…embedded computer…”
Get full text
Article -
110
Guaranteeing service availability in cloud computing
Published 2014-02-01Subjects: “…cloud computing…”
Get full text
Article -
111
-
112
AUTOMATION OF INVENTORY PROCESS OF PERSONAL COMPUTERS
Published 2013-11-01“…The modern information infrastructure of a large or medium-sized enterprise is inconceivable without an effective system of the computer equipment and fictitious assets inventory. …”
Get full text
Article -
113
Variations of one computational geometry problem
Published 2004-12-01“…The paper tries to reveal possible stages of development which lead from the original idea to the final formulation of the problem. The computational geometry task Rectangles, used in Baltic Olympiad in Informatics' 2004 is taken as an example. …”
Get full text
Article -
114
-
115
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
116
Accurate Assessment of Computed Order Tracking
Published 2006-01-01“…We have studied the computed order tracking (COT), and a new computed procedure is proposed for solving the indeterminate results generated by the traditional method at constant speed. …”
Get full text
Article -
117
-
118
-
119
On Computation of Entropy of Hex-Derived Network
Published 2021-01-01“…In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1n and HDN 2n, respectively of order n. We also compute some degree-based entropies such as Randić, ABC, and GA entropy of HDN 1n and HDN 2n.…”
Get full text
Article -
120
Trusted Computing Strengthens Cloud Authentication
Published 2014-01-01“…Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. …”
Get full text
Article