Search alternatives:
processor » processes (Expand Search)
Showing 12,921 - 12,940 results of 30,198 for search '(processor OR process) (computing)', query time: 0.21s Refine Results
  1. 12921
  2. 12922

    Fusion of IDC Operation Support System Design and Analysis by Huazhao Liu, Xuefeng Chen, Qian Yu

    Published 2013-01-01
    “…By the establishment of IDC space, network, cloud computing various levels of resource element model, fusion process, data, operation and service, a standard, and loosely coupled IT support fusion architecture was designed and built, which laid the foundation for IDC intensive operation. …”
    Get full text
    Article
  3. 12923

    URBAN PASSENGER TRANSPORT ROAD NETWORKS: PROSPECTS OF METHODS’ OPTIMIZATION by S. M. Mochalin, J. A. Koleber

    Published 2019-07-01
    “…The existing numerous methods for optimizing urban route networks could be divided into two types: heuristic, which have become classical today, and qualitatively new ones – metaheuristic, allowing managing tasks that contain nonlinear functions in the process of optimizing urban route networks. As modern science, software and computing facilities in the studied area have been developing very fast, metaheuristic methods are becoming a promising direction.Results. …”
    Get full text
    Article
  4. 12924

    Memristive Bellman solver for decision-making by Zhe Feng, Zuheng Wu, Jianxun Zou, Lingli Cheng, Xiaolong Zhao, Xumeng Zhang, Jian Lu, Cong Wang, Yilin Wang, Haochen Wang, Wenbin Guo, Zhibin Qian, Yunlai Zhu, Zuyu Xu, Yuehua Dai, Qi Liu

    Published 2025-05-01
    “…Abstract The Bellman equation, with a resource-consuming solving process, plays a fundamental role in formulating and solving dynamic optimization problems. …”
    Get full text
    Article
  5. 12925
  6. 12926
  7. 12927

    Improving Token-Based Object Detection With Video by Abhineet Singh, Nilanjan Ray

    Published 2025-01-01
    “…This paper improves upon the Pix2Seq object detector by extending it for videos. In the process, it introduces a new way to perform end-to-end video object detection that improves upon existing video detectors in two key ways. …”
    Get full text
    Article
  8. 12928
  9. 12929

    Lightweight encryption solution for train communication network by TANG Jun, GE Qianghua, ZOU Zhirong, CHEN Bo, TANG Pin

    Published 2024-01-01
    “…This solution employs a key negotiation process based on traditional communication encryption scheme, aiming to achieve lightweight encryption in train communication networks and compliance with the authenticity, integrity, and confidentiality requirements of communication data, while greatly reducing hardware demands and computational burdens associated with key management. …”
    Get full text
    Article
  10. 12930

    Research on Development Progress and Test Evaluation of Post-Quantum Cryptography by Meng Zhang, Jing Wang, Junsen Lai, Mingfu Dong, Zhenzhong Zhu, Ryan Ma, Jun Yang

    Published 2025-02-01
    “…This paper first analyzes the threat of quantum computing to existing cryptographic systems, then introduces in detail the main technical routes of PQC and its standardization process. …”
    Get full text
    Article
  11. 12931
  12. 12932

    Efficient and real-time lane detection using CUDA-based implementation by El Boussaki Hoda, Latif Rachid, Saddik Amine

    Published 2024-01-01
    “…However, given its high computational demands, optimization of this process is essential for real-time applications. …”
    Get full text
    Article
  13. 12933

    Lattice-based lightweight post quantum access authentication scheme for satellite network by WANG Shanshan, ZHAO Guofeng, XU Chuan, HAN Zhenzhen

    Published 2024-10-01
    “…In the authentication phase, a low dimensional modular multiplication modular addition mutual authentication algorithm was designed based on the bonsai tree algorithm, which reduced the algorithm complexity from the quadratic level to the linear level, further decreasing the communication costs during the authentication process and computational costs on satellite. Theoretical proof and performance analysis show that the scheme resists quantum computing attacks and reduces authentication time by at least 150% compared to lattice authentication schemes.…”
    Get full text
    Article
  14. 12934
  15. 12935
  16. 12936
  17. 12937
  18. 12938
  19. 12939
  20. 12940