Search alternatives:
processor » processes (Expand Search)
Showing 2,581 - 2,600 results of 30,198 for search '(processor OR process) (computing)', query time: 0.27s Refine Results
  1. 2581
  2. 2582

    HTML5-based graphic image processing and collaborative drawing technology by Yinghua Liang

    Published 2024-12-01
    “…This discovery provides important evidence for its practical application in many fields such as computer vision, medical imaging, and remote sensing image analysis, and helps to promote the development and innovation of image processing technology in these fields to meet the increasing practical needs.…”
    Get full text
    Article
  3. 2583

    Understanding dual process cognition via the minimum description length principle. by Ted Moskovitz, Kevin J Miller, Maneesh Sahani, Matthew M Botvinick

    Published 2024-10-01
    “…We apply a single model based on this observation to findings from research on executive control, reward-based learning, and judgment and decision making, showing that seemingly diverse dual-process phenomena can be understood as domain-specific consequences of a single underlying set of computational principles.…”
    Get full text
    Article
  4. 2584
  5. 2585
  6. 2586

    An approximate diffusion process for environmental stochasticity in infectious disease transmission modelling. by Sanmitra Ghosh, Paul J Birrell, Daniela De Angelis

    Published 2023-05-01
    “…An elegant approach to capturing environmental stochasticity is to model the force of infection as a stochastic process. However, inference in this context requires solving a computationally expensive "missing data" problem, using data-augmentation techniques. …”
    Get full text
    Article
  7. 2587
  8. 2588
  9. 2589

    The Relationship between the Cloud Computing Model and Information Technology Infrastructure Library (ITIL) from the Viewpoint of Experts by Isaias Scalabrin Bianchi, Antônio Pinto, Ruben Pereira

    Published 2025-07-01
    “…Understanding the impacts of the Cloud model on how companies organize their processes is essential. This study aims to investigate the main impacts of the Cloud Computing model on the processes within the Information Technology Infrastructure Library (ITIL) framework. …”
    Get full text
    Article
  10. 2590

    A Secure and Efficient Framework for Multimodal Prediction Tasks in Cloud Computing with Sliding-Window Attention Mechanisms by Weiyuan Cui, Qianye Lin, Jiaqi Shi, Xingyu Zhou, Zeyue Li, Haoyuan Zhan, Yihan Qin, Chunli Lv

    Published 2025-03-01
    “…An efficient and secure computation framework based on the sliding-window attention mechanism and sliding loss function was proposed to address challenges in temporal and spatial feature modeling for multimodal data processing. …”
    Get full text
    Article
  11. 2591

    A Hybrid Task Scheduling Technique in Fog Computing Using Fuzzy Logic and Deep Reinforcement Learning by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2024-01-01
    “…This has created a need for more effective methods of processing and managing this data. Conventional cloud computing often fails to fulfill the need of IoT usage in terms of high bandwidth, low makespan, and real-time processing. …”
    Get full text
    Article
  12. 2592

    A secure and efficient encryption system based on adaptive and machine learning for securing data in fog computing by Priyanka Rajan Kumar, Sonia Goel

    Published 2025-04-01
    “…Abstract Fog computing, as a crucial component of the edge computing paradigm, offers significant advantages in terms of reduced latency and real-time processing. …”
    Get full text
    Article
  13. 2593

    Efficient Task Scheduling and Load Balancing in Fog Computing for Crucial Healthcare Through Deep Reinforcement Learning by Prashanth Choppara, Bommareddy Lokesh

    Published 2025-01-01
    “…The paper addresses the limitations of cloud computing systems. It proposes and replaces a fog computing architecture in supporting low latency for healthcare applications. …”
    Get full text
    Article
  14. 2594
  15. 2595

    Quantum reservoir probing: An inverse paradigm of quantum reservoir computing for exploring quantum many-body physics by Kaito Kobayashi, Yukitoshi Motome

    Published 2025-06-01
    “…Quantum reservoir computing (QRC) is a brain-inspired computational paradigm that exploits the natural dynamics of a quantum system for information processing. …”
    Get full text
    Article
  16. 2596

    Enhancing energy efficiency and cpu utilization in edge computing through deep learning-based data smoothing by Himabindu Sathyaveti, C. Gomathy

    Published 2025-06-01
    “…These enhancements help increase the eco-friendly and resourceful nature of edge computing. Results from experiments show that SOResNet improves both performance and energy efficiency in edge data processing for real-time systems.…”
    Get full text
    Article
  17. 2597
  18. 2598

    A Secure Medical Data Framework Integrating Blockchain and Edge Computing: An Attribute-Based Signcryption Approach by Tengyue Dou, Zhiming Zheng, Wangjie Qiu, Chunxia Ge

    Published 2025-04-01
    “…The framework collects data via smart devices, which is then processed and encrypted at edge nodes and stored securely on the blockchain. …”
    Get full text
    Article
  19. 2599

    High Performance Numerical Computing for High Energy Physics: A New Challenge for Big Data Science by Florin Pop

    Published 2014-01-01
    “…The computational methods presented are Monte Carlo methods and simulations of HEP processes, Markovian Monte Carlo, unfolding methods in particle physics, kernel estimation in HEP, and Random Matrix Theory used in analysis of particles spectrum. …”
    Get full text
    Article
  20. 2600

    Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and Challenges by K. Tlemcani, K. Azbeg, E. Saoudi, L. Fetjah, O. Ouchetto, S. Jai Andaloussi

    Published 2025-01-01
    “…We analyzed 52 studies, categorizing findings into three key areas: enhanced data security and privacy through decentralized frameworks and tamper-proof storage; real-time data processing, enabled by edge computing for immediate analytics and alerts; and scalability, achieved via hybrid architectures that optimize data handling. …”
    Get full text
    Article