Search alternatives:
processor » processes (Expand Search)
Showing 2,981 - 3,000 results of 30,198 for search '(processor OR process) (computing)', query time: 0.28s Refine Results
  1. 2981

    Assurance in Advanced 5G Edge Continuum by Filippo Berto, Claudio A. Ardagna, Massimo Banzi, Marco Anisetti

    Published 2024-01-01
    “…This approach facilitates the support of distributed processing pipelines. In this context, there is an increasing demand for solutions that can continuously guarantee the non-functional properties (e.g. security and performance) of such applications. …”
    Get full text
    Article
  2. 2982

    Vectorized Highly Parallel Density-Based Clustering for Applications With Noise by Joseph Arnold Xavier, Juan Pedro Gutierrez Hermosillo Muriedas, Stepan Nassyr, Rocco Sedona, Markus Gotz, Achim Streit, Morris Riedel, Gabriele Cavallaro

    Published 2024-01-01
    “…As the volume of data continues to grow and advancements in high-performance computing evolve, a critical need has emerged for algorithms that can efficiently process these computations and exploit the various levels of parallelism offered by modern supercomputing systems. …”
    Get full text
    Article
  3. 2983
  4. 2984
  5. 2985

    A Model for Diagnosing the Cognitive Activity of Students of Secondary Vocational Education System in Teaching Computer Science by K. Timofeeva

    Published 2025-05-01
    “…Based on the revealed essence of cognitive activity in subject training, a model for diagnosing the cognitive activity of students of secondary vocational education in computer science classes has been compiled, substantiated and tested in the real educational process, allowing for a reliable picture of the effectiveness of the educational   process in the studied groups, taking into account cognitive,   psychological and social criteria, as well as the level of initial training   in computer science. …”
    Get full text
    Article
  6. 2986

    Computer Modeling of Burning Ceramic Stone Charge Taking into Account Natural Air Convection Inside of Charge by A. N. Chichko, A. S. Borozdine, S. G. Likhouzov

    Published 2006-06-01
    “…Computer modeling of burning process for a charge fragment by specified temperature curve has been carried out. …”
    Get full text
    Article
  7. 2987
  8. 2988
  9. 2989
  10. 2990
  11. 2991

    Full Data-Processing Power Load Forecasting Based on Vertical Federated Learning by Zhengxiong Mao, Hui Li, Zuyuan Huang, Yuan Tian, Peng Zhao, Yanan Li

    Published 2023-01-01
    “…The first problem is a lack of a full data-processing procedure, and the second is a lack of enhanced privacy protection for data processing. …”
    Get full text
    Article
  12. 2992

    A Genetic Programming Approach to Reconfigure a Morphological Image Processing Architecture by Emerson Carlos Pedrino, José Hiroki Saito, Valentin Obac Roda

    Published 2011-01-01
    “…Genetic programming is a branch of evolutionary computing, and it is consolidating as a promising method for applications of digital image processing. …”
    Get full text
    Article
  13. 2993
  14. 2994
  15. 2995
  16. 2996
  17. 2997

    Water Level Detection and Flood Early Warning System Using Image Processing by Muhammad Akmal Ilmi, I Komang Somawirata, Michael Ardita

    Published 2025-04-01
    “…Image processing is a crucial method in modern technology, enabling computers to analyze and extract information from images or videos. …”
    Get full text
    Article
  18. 2998
  19. 2999

    Survey for Sensor-Cloud System from Business Process Outsourcing Perspective by JeongYeon Kim

    Published 2015-09-01
    “…Cloud computing is a new IT trend to meet the new business requirements such as business agility and operational efficiency with business process outsourcing (BPO). …”
    Get full text
    Article
  20. 3000

    Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks by Lei Yang, Junyan Niu, Jiangfeng Li

    Published 2025-03-01
    “…Computer network security (CNS) evaluation is the process of analyzing and assessing the security of a network system. …”
    Get full text
    Article