Search alternatives:
implications » applications (Expand Search)
Showing 21 - 40 results of 30,238 for search '(application OR implications) (computing)', query time: 0.27s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24

    Application progress of SGX in trusted computing area by Bo ZHAO, Anqi YUAN, Yang AN

    Published 2021-12-01
    “…The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX were introduced, the research status of SGX in the field of trusted computing were analyzed.Then, sorted out the current application difficulties and solutions of SGX were sorted out and compared with other trusted computing technologies.Finally, SGX technology development direction in the field of trusted computing was discussed.…”
    Get full text
    Article
  5. 25

    REVIEW ON FOG COMPUTINGAPPLICATIONS, SECURITY, AND SOLUTIONS by Varun Varma Sangaraju, SV Achuta Rao, Amjan Shaik, Prasuna VG, Nagaraju P B S.R.K.R.

    Published 2025-03-01
    “…Fog computing boasts a plethora of applications across various industries. …”
    Get full text
    Article
  6. 26

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32

    Scalable Full-Stack Benchmarks for Quantum Computers by Jordan Hines, Timothy Proctor

    Published 2024-01-01
    Subjects: “…Application benchmarks…”
    Get full text
    Article
  13. 33
  14. 34
  15. 35

    Survey on Computational Applications of Tensor-Network Simulations by Marcos Diez Garcia, Antonio Marquez Romero

    Published 2024-01-01
    “…Tensor networks are a popular and computationally efficient approach to simulate general quantum systems on classical computers and, in a broader sense, a framework for dealing with high-dimensional numerical problems. …”
    Get full text
    Article
  16. 36
  17. 37
  18. 38

    The Development and Application of Computers and Information Technology in the Military by Zhang Yinxiong

    Published 2025-01-01
    “…This paper aims to explore the development and application of computers and information technology in the military field. …”
    Get full text
    Article
  19. 39
  20. 40

    APPLICATION OF COMPUTER TECHNOLOGIES IN TEACHING OF MEDICAL STUDENTS by O. V. Vorobeichikova

    Published 2014-08-01
    “…he purpose of the given research are situational tasks from the point of view of algorithms of their decision and application of computer technologies for realization of similar algorithms. …”
    Get full text
    Article