Search alternatives:
processor » processes (Expand Search)
Showing 2,541 - 2,560 results of 30,198 for search '(processor OR process) (computing)', query time: 0.27s Refine Results
  1. 2541
  2. 2542
  3. 2543
  4. 2544

    Nonlocal phase-change metaoptics for reconfigurable nonvolatile image processing by Guoce Yang, Mengyun Wang, June Sang Lee, Nikolaos Farmakidis, Joe Shields, Carlota Ruiz de Galarreta, Stuart Kendall, Jacopo Bertolotti, Andriy Moskalenko, Kairan Huang, Andrea Alù, C. David Wright, Harish Bhaskaran

    Published 2025-05-01
    “…Abstract The next generation of smart imaging and vision systems will require compact and tunable optical computing hardware to perform high-speed and low-power image processing. …”
    Get full text
    Article
  5. 2545
  6. 2546

    Hardware Implementation of Block Floating-Point FFT Based on Approximate Computation and Conflict-Free Access by Xiaohui Zhang, Zenghui Yu, Shushan Qiao, Yi Zhan

    Published 2025-01-01
    “…This paper proposes a novel Fast Fourier Transform hardware architecture for natural-order multi-input multi-output processing, which is based on approximate computing and the block floating-point data format. …”
    Get full text
    Article
  7. 2547

    An Area-Efficient Continuous-Time Ising Machine Featuring Dynamic Threshold Annealing by Yufeng Wu, Xiaofeng Li, Jiayin Song, Yi Zhan, Shushan Qiao

    Published 2025-01-01
    “…In this work, we present a CT Ising machine with an eDRAM-based in-memory computing architecture. The design introduces a neighboring spin computation-sharing architecture that halves the storage overhead of interaction coefficients, thereby significantly reducing the spin cell area. …”
    Get full text
    Article
  8. 2548
  9. 2549

    Peculiarities of teaching students with mosaic thinking by S. A. Polevoy, V. V. Pavlova

    Published 2017-05-01
    Subjects: “…organization of education process…”
    Get full text
    Article
  10. 2550
  11. 2551

    Structured Shared Spaces as a Basis for Building Business Process Support Systems: A Generic Model and Analysis of Examples by Ilia Bider, Paul Johannesson, Erik Perjons

    Published 2018-10-01
    “…Though the concept of shared spaces had been known in Groupware and Computer Supported Cooperative Work (CSCW) for quite a while, it did not become popular until the arrival of the Internet and social software. …”
    Get full text
    Article
  12. 2552
  13. 2553

    MPJ-SPARK Integration-Based Technique to Enhance Big Data Analytics in High Performance Computing Environments by Sakhr A. Saleh, Maher A. Khemakhem, Fathy E. Eassa

    Published 2025-01-01
    “…Each worker operates with an isolated Spark driver, processes tasks independently, and returns results to the root process for aggregation. …”
    Get full text
    Article
  14. 2554

    Evaluating CPU, GPU, and FPGA performance in the context of modal reverberation: a comparative analysis by Romain Michon, Michele Ducceschi, Pierre Cochard, Travis Skare, Craig J. Webb, Riccardo Russo

    Published 2025-04-01
    “…By leveraging their respective architectures, these processors are assessed for their ability to manage the high computational demands of modal synthesis. …”
    Get full text
    Article
  15. 2555

    Flow-of-traffic prediction program based mobile edge computing for Internet of vehicles using double auction by Yan LIN, Shuai YAN, Yijin ZHANG, Chunguo LI, Feng SHU

    Published 2020-12-01
    “…With an aim of maximizing the efficiency of edge offloading and the resource utilization of edge computing server simultaneously, a new flow-of-traffic prediction based edge computing offloading solution was proposed for Internet of vehicles (IoV).Firstly, both the efficiency utility function of vehicle and the resource utilization of mobile edge computing (MEC) server were established by considering task priority.Next, the formulated dual-objective optimization problem was transformed into a double auction problem between vehicles and MEC servers.Finally, based on the designed flow-of-traffic based pricing function of vehicle and MEC server, a McAfee auction algorithm was adopted to complete the edge computing process.Simulation results show that benefiting from the flow-of-traffic prediction information, the proposed solution can significantly improve both the efficiency of computation offloading and the utilization of computation resource.…”
    Get full text
    Article
  16. 2556

    Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users by Bangyan Chen, Jun Ye

    Published 2025-02-01
    “…In the actual use of this process, the computing resources possessed by a single user are limited so that the cooperation of multiple users are needed, but the joint learning of multiple users introduces the problem of privacy leakage. …”
    Get full text
    Article
  17. 2557

    Analysis of LMS Implementation Success Based on Information System Success and End-User Computing Satisfaction Models by Rahmat Pambudi, Berlilana Berlilana, Giat Karyono

    Published 2025-08-01
    “…After collecting the data, the next step is to process it using the SEM-PLS multivariate analysis technique, which includes validating the measurement model as well as the structural model. …”
    Get full text
    Article
  18. 2558

    A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing by Taiyong Li, Minggao Yang, Jiang Wu, Xin Jing

    Published 2017-01-01
    “…To further enhance the security of image, in this paper, we propose a novel algorithm that combines the fractional-order hyperchaotic Lorenz system and DNA computing (FOHCLDNA) for image encryption. Specifically, the algorithm consists of four parts: firstly, we use a fractional-order hyperchaotic Lorenz system to generate a pseudorandom sequence that will be utilized during the whole encryption process; secondly, a simple but effective diffusion scheme is performed to spread the little change in one pixel to all the other pixels; thirdly, the plain image is encoded by DNA rules and corresponding DNA operations are performed; finally, global permutation and 2D and 3D permutation are performed on pixels, bits, and acid bases. …”
    Get full text
    Article
  19. 2559

    Polarity-tunable dye-sensitized optoelectronic artificial synapses for physical reservoir computing-based machine vision by Hiroaki Komatsu, Norika Hosoda, Takashi Ikuno

    Published 2025-05-01
    “…Abstract Conventional machine vision systems process huge time-series data per second, presenting significant challenges for edge-device applications due to limitations in data transfer and storage. …”
    Get full text
    Article
  20. 2560

    Risk management strategy for generative AI in computing education: how to handle the strengths, weaknesses, opportunities, and threats? by Niklas Humble

    Published 2024-12-01
    “…Findings of the study have both theoretical and practical implications for computing education specifically, and higher education in general. …”
    Get full text
    Article