Search alternatives:
processor » processes (Expand Search)
Showing 3,321 - 3,340 results of 30,198 for search '(processor OR process) (computing)', query time: 0.26s Refine Results
  1. 3321

    Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment by Zhun Wang, Xue Chen

    Published 2023-01-01
    “…Aiming at the problems of low detection rate and high false detection rate of intrusion detection algorithms in the traditional cloud computing environment, an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment is proposed. …”
    Get full text
    Article
  2. 3322

    Tactile near-sensor computing systems incorporating hourglass-shaped microstructured capacitive sensors for bio-realistic energy efficiency by Jae-Yeong Cho, Seong Eun Kim, Chang-Jae Beak, Jihwan Lee, Wonjeong Suh, Bo-Yeon Lee, Sin-Hyung Lee

    Published 2025-05-01
    “…Abstract Bio-inspired near-sensor computing, which integrates sensing and processing functions, presents a promising strategy to enhance efficiency and reduce latency in such applications. …”
    Get full text
    Article
  3. 3323
  4. 3324

    Enhancing Data Privacy Protection and Feature Extraction in Secure Computing Using a Hash Tree and Skip Attention Mechanism by Zizhe Zhou, Yaqi Wang, Lin Cong, Yujing Song, Tianyue Li, Meishu Li, Keyi Xu, Chunli Lv

    Published 2024-11-01
    “…The hash tree is employed to ensure data integrity and security, enabling the rapid verification of data changes, while the skip attention mechanism enhances computational efficiency by allowing the model to selectively focus on important features, thus minimizing unnecessary processing. …”
    Get full text
    Article
  5. 3325

    A KWS System for Edge-Computing Applications with Analog-Based Feature Extraction and Learned Step Size Quantized Classifier by Yukai Shen, Binyi Wu, Dietmar Straeussnigg, Eric Gutierrez

    Published 2025-04-01
    “…Edge-computing applications demand ultra-low-power architectures for both feature extraction and classification tasks. …”
    Get full text
    Article
  6. 3326

    Beyond boundaries a hybrid cellular potts and particle swarm optimization model for energy and latency optimization in edge computing by Dinesh Sahu, Nidhi, Shiv Prakash, Priyanshu Sinha, Tiansheng Yang, Rajkumar Singh Rathore, Lu Wang

    Published 2025-02-01
    “…Abstract The need to compute data in real-time and manage resources in environments with distributed computing has given edge computing significant importance. …”
    Get full text
    Article
  7. 3327

    Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks by Muwafaq Jawad, Ali A. Yassin, Hamid Ali Abed Al-asadi, Zaid Ameen Abduljabbar, Vincent Omollo Nyangares, Zaid Alaa Hussien, Husam A. Neamah

    Published 2025-04-01
    “…Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity, and self-defense capabilities of its devices. …”
    Get full text
    Article
  8. 3328
  9. 3329
  10. 3330
  11. 3331
  12. 3332
  13. 3333
  14. 3334
  15. 3335

    Sum and Tensor of Quantitative Effects by Giorgio Bacci, Radu Mardare, Prakash Panangaden, Gordon Plotkin

    Published 2024-10-01
    “…Finally, as an application, we provide the first quantitative algebraic axiomatizations to the following coalgebraic structures: Markov processes, labelled Markov processes, Mealy machines, and Markov decision processes, each endowed with their respective bisimilarity metrics. …”
    Get full text
    Article
  16. 3336

    RN‐Net: Reservoir Nodes‐Enabled Neuromorphic Vision Sensing Network by Sangmnin Yoo, Eric Yeu‐Jer Lee, Ziyu Wang, Xinxin Wang, Wei D. Lu

    Published 2024-12-01
    “…Neuromorphic computing systems promise high energy efficiency and low latency. …”
    Get full text
    Article
  17. 3337

    Influence of proteinoids on calcium carbonate polymorphs precipitation in supersaturated solutions by Panagiotis Mougkogiannis, Andrew Adamatzky

    Published 2025-01-01
    “…Proteinoids, or thermal proteins, are amino acid polymers formed at high temperatures by non-biological processes. Pro- teinoids form microspheres in liquids. …”
    Get full text
    Article
  18. 3338

    U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds by Jiawei Ye, Ming Yan, Shenglin Wu, Jingxuan Tan, Jie Wu

    Published 2025-05-01
    “…Moreover, our method can effectively reduce the original processing data to 13%, which means that it significantly lowers the cost of computing resources.…”
    Get full text
    Article
  19. 3339
  20. 3340

    A model for correlation-based choreographic programming by Saverio Giallorenzo, Fabrizio Montesi, Maurizio Gabbrielli

    Published 2024-12-01
    “…To provide its correctness guarantee, Applied Choreographies comes with a compilation procedure that transforms a choreography into a low-level, implementation-adherent calculus of Service-Oriented Computing (SOC). To manage the complexity of the compilation, we divide its formalisation and proof into three stages, respectively dealing with: (a) the translation of name-based communications into their SOC equivalents, namely, using correlation mechanisms based on message data; (b) the projection of the given choreography into a composition of partial, single-participant choreographies (towards their translation into SOC processes); (c) the translation of partial choreographies and the distribution of global, choreography-level state into local SOC processes. …”
    Get full text
    Article