Search alternatives:
processor » processes (Expand Search)
Showing 2,841 - 2,860 results of 30,198 for search '(processor OR process) (computing)', query time: 0.22s Refine Results
  1. 2841
  2. 2842
  3. 2843
  4. 2844
  5. 2845
  6. 2846
  7. 2847
  8. 2848
  9. 2849

    A Survey on Deepfake Video Detection by Peipeng Yu, Zhihua Xia, Jianwei Fei, Yujiang Lu

    Published 2021-11-01
    Subjects: “…computer crime…”
    Get full text
    Article
  10. 2850
  11. 2851
  12. 2852
  13. 2853
  14. 2854

    Edge Cloud Resource Scheduling with Deep Reinforcement Learning by Y. Feng, M. Li, J. Li, Y. Yu

    Published 2025-04-01
    “…Moreover, we develop innovative reward functions and concurrent processing mechanisms to minimize training time. Furthermore, we enhance the Proximal Policy Optimization (PPO) algorithm to improve adaptability, increase the accuracy of likelihood ratio estimation, identify a more suitable activation function, and impose constraints on gradient updates. …”
    Get full text
    Article
  15. 2855

    Exploring Smartphone-Based Edge AI Inferences Using Real Testbeds by Matías Hirsch, Cristian Mateos, Tim A. Majchrzak

    Published 2025-05-01
    “…To empirically answer this, we use three pre-trained DL models and eight heterogeneous edge nodes including five low/mid-end smartphones and three SBCs, and compare the performance achieved using workloads from three image stream processing scenarios. Experiments were run with the help of a toolset designed for reproducing battery-driven edge computing tests. …”
    Get full text
    Article
  16. 2856
  17. 2857
  18. 2858

    An Improved Ant Colony Optimization Approach for Optimization of Process Planning by JinFeng Wang, XiaoLiang Fan, Haimin Ding

    Published 2014-01-01
    “…Computer-aided process planning (CAPP) is an important interface between computer-aided design (CAD) and computer-aided manufacturing (CAM) in computer-integrated manufacturing environments (CIMs). …”
    Get full text
    Article
  19. 2859

    Calculation of coal cleats spacing for methane degassing by image processing by Adel Taheri, Farhang Sereshki, Fatemeh Sadat Rohani

    Published 2025-01-01
    “…Computer-based image processing technology was conducted to determine the coal cleats. …”
    Get full text
    Article
  20. 2860

    Overview of control-flow hijacking attack and defense techniques for process by Fengfeng WANG, Tao ZHANG, Weiguang XU, Meng SUN

    Published 2019-12-01
    “…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
    Get full text
    Article