Search alternatives:
processor » processes (Expand Search)
Showing 1,081 - 1,100 results of 30,198 for search '(processor OR process) (computing)', query time: 0.20s Refine Results
  1. 1081

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  2. 1082

    Technology development mode of communication/sensing/computing/intelligence integration by Xiangyang DUAN, Li YANG, Shuqiang XIA, Zhiqiang HAN, Feng XIE

    Published 2022-03-01
    “…Various new functions and services related to communication/sensing/computing/intelligence have been targeted, developed and fused into the existing 5G-Advanced and emerging 6G new system.The technical scenarios and use cases of communication/sensing/computing/intelligence integration and its expectation for technique mode requirementin 5G-Advanced and 6G different phases were addressed, meanwhile five characteristics of its technology development mode were extracted.The proposed viewpoints may guide the research and development of 5G-Advanced system and standardization process of 6G new system in future, leading to more effective and profitable applications and maximization of business value from communication/sensing/computing/intelligence integration.…”
    Get full text
    Article
  3. 1083

    Design method of secure computing protocol for deep neural network by Renwan BI, Qianxin CHEN, Jinbo XIONG, Ximeng LIU

    Published 2020-08-01
    “…Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.…”
    Get full text
    Article
  4. 1084

    Exploration and practice of data quality governance in privacy computing scenarios by Yan ZHANG, Yifan YANG, Ren YI, Shengmei LUO, Jianfei TANG, Zhengxun XIA

    Published 2022-09-01
    “…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
    Get full text
    Article
  5. 1085

    Building method of distributed COW disk on network computing environment by Huai-liang TAN, Zheng LUO, Zai-hong HE, Ren-fa LI

    Published 2012-07-01
    “…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
    Get full text
    Article
  6. 1086

    Cognitive Computing and Business Intelligence Applications in Accounting, Finance and Management by Sio-Iong Ao, Marc Hurwitz, Vasile Palade

    Published 2025-02-01
    “…Cognitive computing encompasses computing tools and methods that simulate and mimic the process of human thinking, without human supervision. …”
    Get full text
    Article
  7. 1087

    Fermionic wave packet scattering: a quantum computing approach by Yahui Chai, Arianna Crippa, Karl Jansen, Stefan Kühn, Vincent R. Pascuzzi, Francesco Tacchino, Ivano Tavernelli

    Published 2025-02-01
    “…Quantum computing provides a novel avenue towards simulating dynamical phenomena, and, in particular, scattering processes relevant for exploring the structure of matter. …”
    Get full text
    Article
  8. 1088

    Cloud Computing Services: Benefits, Risks and Intellectual Property Issues by IONELA BĂLŢĂTESCU

    Published 2014-05-01
    “…Patent strategy of certain proprietary software companies leaded to a veritable “patent war” and “patent arm race” endangering the process of standardization in software industry, especially in cloud computing. …”
    Get full text
    Article
  9. 1089

    An Autonomous Planning Model for Deploying IoT Services In Fog Computing by Mansoureh Zare, Yasser Elmi sola, Hesam Hasanpour

    Published 2024-02-01
    “…Therefore, processing, analysis and storage are closer to the source of data and end users cause the delay is reduced. …”
    Get full text
    Article
  10. 1090

    Scope for Applications Management in India of Soft Computing in effective Classroom by Souren Bhattacharya, Subhasree Pal, Parimal Sarkar

    Published 2022-01-01
    “…Soft computing has the potential to address the issues.…”
    Get full text
    Article
  11. 1091

    Hybrid quantum and in-memory computing for accelerating solving Simon’s problem by Zheng Miao, Yongxiang Li, Shiqing Wang, Zhong Sun

    Published 2025-06-01
    “…While quantum algorithms can exponentially reduce the complexity of Simon’s problem, the overall computational complexity remains O(n3), which is imposed by the process of solving a system of linear equations in modulo 2 arithmetic (Mod-2 LEs). …”
    Get full text
    Article
  12. 1092

    Key metrics for monitoring performance variability in edge computing applications by Panagiotis Giannakopoulos, Bart van Knippenberg, Kishor Chandra Joshi, Nicola Calabretta, George Exarchakos

    Published 2025-05-01
    “…Edge computing systems typically consist of heterogeneous processing and networking components, resulting in inconsistent task performance. …”
    Get full text
    Article
  13. 1093

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
    Get full text
    Article
  14. 1094

    CMOS Single-Photon Avalanche Diode Circuits for Probabilistic Computing by William Whitehead, Wonsik Oh, Luke Theogarajan

    Published 2024-01-01
    “…Measured results from the SPAD design space show that even extremely small SPADs are suitable for probabilistic computing purposes, and that high dark count rates are not detrimental either, so SPADs for probabilistic computing are actually easier to integrate in standard CMOS processes. …”
    Get full text
    Article
  15. 1095

    Cognitive Computing with Large Language Models for Student Assessment Feedback by Noorhan Abbas, Eric Atwell

    Published 2025-04-01
    “…While traditional assessment methods emphasise both achievements and development areas, the process remains time-intensive for educators. This research explores the application of cognitive computing, specifically open-source Large Language Models (LLMs) Mistral-7B and CodeLlama-7B, to streamline feedback generation for student reports containing both Python programming elements and English narrative content. …”
    Get full text
    Article
  16. 1096

    Energy-Accuracy Trade-Offs for Resistive In-Memory Computing Architectures by Saion K. Roy, Naresh R. Shanbhag

    Published 2024-01-01
    “…Resistive in-memory computing (IMC) architectures currently lag behind SRAM IMCs and digital accelerators in both energy efficiency and compute density due to their low compute accuracy. …”
    Get full text
    Article
  17. 1097

    Load balancing for high performance computing using quantum annealing by Omer Rathore, Alastair Basden, Nicholas Chancellor, Halim Kusumaatmaja

    Published 2025-01-01
    “…Load balancing is the distribution of computational work between available processors. Here, we investigate the application of quantum annealing to load balance two paradigmatic algorithms in high-performance computing. …”
    Get full text
    Article
  18. 1098
  19. 1099

    Proposal for a Security Management in Cloud Computing for Health Care by Knut Haufe, Srdan Dzombeta, Knud Brandis

    Published 2014-01-01
    “…Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. …”
    Get full text
    Article
  20. 1100

    Information and Computing Ecosystem’s Architecture for Monitoring and Forecasting Natural Disasters by Valeria Gribova, Dmitry Kharitonov

    Published 2024-12-01
    “…However, there is a great disunity among methods and means of data analysis, formats and interfaces of storing and providing data, and software and information systems for data processing. As part of a large project to create a planetary observatory that combines data from spatially distributed geosphere monitoring systems, the efforts of leading institutes of the Russian Academy of Sciences are also aimed at creating an information and computing ecosystem to unite researchers processing and analyzing the data obtained. …”
    Get full text
    Article