Search alternatives:
processor » processes (Expand Search)
Showing 13,821 - 13,840 results of 30,198 for search '(processor OR process) (computing)', query time: 0.31s Refine Results
  1. 13821
  2. 13822

    Performance enhancement in blockchain based IoT data sharing using lightweight consensus algorithm by Ehtisham Ul Haque, Waseem Abbasi, Ahmad Almogren, Jaeyoung Choi, Ayman Altameem, Ateeq Ur Rehman, Habib Hamam

    Published 2024-11-01
    “…Abstract The proliferation of Internet of Things (IoT) devices generates vast amounts of data, traditionally stored, processed, and analyzed using centralized systems, making them susceptible to attacks. …”
    Get full text
    Article
  3. 13823
  4. 13824
  5. 13825

    Advancing Breast Cancer Detection: SE-Conformer Framework for Malignancy Detection in Histopathology Images by Lekha S. Nair, K. R. Amarnath, Jyothisha J. Nair

    Published 2025-01-01
    “…The extracted features are then processed by a Conformer block, which further refines them by emphasizing the most relevant regions in the input feature map. …”
    Get full text
    Article
  6. 13826

    Development and investigation of parallel model of bee colony algorithms for cryptanalysis problem solving by Yury O Chernyshev, Alexander S Sergeev, Alexander N Ryazanov, Evgeny O. Dubrov

    Published 2017-03-01
    “…Besides, the problem solution is provided: to find the required smallest number of processors of the homogeneous parallel computing systems with distributed memory, and a uniform plan for the implementation of operators for them, for the cryptanalysis algorithm based on the constructed information-logical graph data-logical graph, and for the preset time. …”
    Get full text
    Article
  7. 13827
  8. 13828

    Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM by Kais Belwafi, Abdulhadi Shoufan, Mariam Alsafi, Ashfaq Ahmed, Kyusuk Han

    Published 2024-01-01
    “…The proposed architecture consists of four key modules: a Zero-Trust Processor (ZTP) with an RV64 core, a Zero-Trust Management (ZTM) unit with an RV32 core featuring Certificate and Secret Storage (CSS) and a Certificate Management Unit (CMU). …”
    Get full text
    Article
  9. 13829
  10. 13830
  11. 13831
  12. 13832
  13. 13833

    Mapping Data Mining Technique and Gamification Approach for Studying Post-Stroke Rehabilitation Training: A Systematic Literature Review by Nooralisa Mohd Tuah, Daphne Lianeta Goh, Syed Nasirin, Fatimah Ahmedy, Mohammad Hossin

    Published 2023-01-01
    “…Thus, to understand how researchers studied them, we examined 34 peer-reviewed articles published in computer science and medical proceedings and journals between 2012 and 2022. …”
    Get full text
    Article
  14. 13834

    Digital traceability in horticulture: a systematic review of edge-cloud-blockchain-terminal (ECBT) integration with IoT and AI technologies by Yan Huang, Xin Li, Luyi Xu, Yongqiang Ma

    Published 2025-08-01
    “…This systematic mini-review examines the Edge-Cloud-Blockchain-Terminal (ECBT) framework—an integrated architecture positioning blockchain as the trust backbone connecting distributed computing, edge intelligence, and user terminals—for comprehensive traceability. …”
    Get full text
    Article
  15. 13835
  16. 13836
  17. 13837
  18. 13838
  19. 13839
  20. 13840

    Low-Cost, LiDAR-Based, Dynamic, Flood Risk Communication Viewer by Debra F. Laefer, Evan O’Keeffe, Kshitij Chandna, Kim Hertz, Jing Zhu, Raul Lejano, Anh Vu Vo, Michela Bertolotto, Ulrich Ofterdinger

    Published 2025-02-01
    “…Through decoupling physics-based predictions from the visualization, a dynamic, flood risk viewer was produced with modest processing resources involving only a single, quad-core processor with a frequency around 4.30 GHz and with no graphics card. …”
    Get full text
    Article