Search alternatives:
processor » processes (Expand Search)
Showing 12,981 - 13,000 results of 30,198 for search '(processor OR process) (computing)', query time: 0.27s Refine Results
  1. 12981

    The Effectiveness and Clinical Usability of a Handheld Information Appliance by Patricia A. Abbott

    Published 2012-01-01
    “…This study was designed to gain a deeper understanding of clinicians’ interactions with a mobile clinical computing appliance (Motion Computing C5) designed to consolidate numerous technological functions into an all-in-one device. …”
    Get full text
    Article
  2. 12982
  3. 12983

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  4. 12984

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  5. 12985
  6. 12986
  7. 12987
  8. 12988

    Cloud–Edge Collaborative Model Adaptation Based on Deep Q-Network and Transfer Feature Extraction by Jue Chen, Xin Cheng, Yanjie Jia, Shuai Tan

    Published 2025-07-01
    “…With the rapid development of smart devices and the Internet of Things (IoT), the explosive growth of data has placed increasingly higher demands on real-time processing and intelligent decision making. Cloud-edge collaborative computing has emerged as a mainstream architecture to address these challenges. …”
    Get full text
    Article
  9. 12989

    Parallel Methods and Higher Dimensional NLS Equations by M. S. Ismail, T. R. Taha

    Published 2013-01-01
    “…These schemes are very well suited for parallel implementation on a high performance system with many processors due to the nature of the computation that involves solving the same block tridiagonal systems with many right hand sides. …”
    Get full text
    Article
  10. 12990

    Load Balancer Operation Analyses of Video-Conference Service by A. N. Markov, A. I. Paramonov

    Published 2022-09-01
    “…The graphs of the load on the hardware components of the virtual server at three stages of testing for the central processor, RAM, and network interfaces both within the service and in the structure of the local computer network are given. …”
    Get full text
    Article
  11. 12991
  12. 12992

    MFF-Net: A Lightweight Multi-Frequency Network for Measuring Heart Rhythm from Facial Videos by Wenqin Yan, Jialiang Zhuang, Yuheng Chen, Yun Zhang, Xiujuan Zheng

    Published 2024-12-01
    “…The SSA-module can help a signal reconstruction network locate the obvious inferior parts in the reconstruction process so as to make better decisions when merging multi-dimensional signals. …”
    Get full text
    Article
  13. 12993

    On the optimal layout of (K p  − C p ) n into grid and certain structures by G. Caroline Vincy, David Raj Micheal

    Published 2025-05-01
    “…Abstract Interconnection networks constitute complex configurations of processors and communication links that facilitate data transmission between processors in a parallel computing system. …”
    Get full text
    Article
  14. 12994

    Research on anonymous identity authentication technology in Fabric by Yueyang YE, Xinglan ZHANG

    Published 2021-06-01
    “…Solving the privacy problem of users in the consortium blockchain becomes the key to accelerate the implementation of the practical application of blockchain.A set of anonymous identity authentication scheme based on PKI is designed based on Hyperledger Fabric platform, a typical representative of the consortium blockchain.By splitting the private key d into two parts, different roles use each private key to generate the joint signature of the anonymous certificate to achieve the separation of permissions in the process of certificate generation and solve the single point attack problem in the process of anonymous certificate tracking.The analysis shows that the improved scheme can achieve higher security than the original scheme with lower computing and storage overhead.…”
    Get full text
    Article
  15. 12995

    COM-MABs: From Users' Feedback to Recommendation by Alexandre Letard, Tassadit Amghar, Olivier Camp, Nicolas Gutowski

    Published 2022-05-01
    “…On the study of those strategies, this paper present three contributions: 1) We model a feedback strategy as a three-step process, where each step influences the performances of an agent ; 2) Based on this model, we propose a novel Reward Computing process, BUSBC, which significantly increases the global accuracy reached by optimistic COM-MAB algorithms -- up to 16.2\% -- ; 3) We conduct an empirical analysis of our approach and several feedback strategies from the literature on three real-world application datasets, confirming our propositions.…”
    Get full text
    Article
  16. 12996

    Survey of video behavior recognition by Huilan LUO, Chanjuan WANG, Fei LU

    Published 2018-06-01
    “…Behavior recognition is developing rapidly,and a number of behavior recognition algorithms based on deep network automatic learning features have been proposed.The deep learning method requires a large number of data to train,and requires higher computer storage and computing power.After a brief review of the current popular behavior recognition method based on deep network,it focused on the traditional behavior recognition methods.Traditional behavior recognition methods usually followed the processes of video feature extraction,modeling of features and classification.Following the basic process,the recognition process was overviewed according to the following steps,feature sampling,feature descriptors,feature processing,descriptor aggregation and vector coding.At the same time,the benchmark data set commonly used for evaluating the algorithm performance was also summarized.…”
    Get full text
    Article
  17. 12997
  18. 12998
  19. 12999
  20. 13000