Search alternatives:
processor » processes (Expand Search)
Showing 1,801 - 1,820 results of 30,198 for search '(processor OR process) (computing)', query time: 0.24s Refine Results
  1. 1801
  2. 1802

    CMOS‐Compatible HfOx‐Based Radiation Hardening Component for Neuromorphic Computing Applications by Yao‐Feng Chang, Yifu Huang, Chin‐Han Chung, Ying‐Chen Chen

    Published 2025-06-01
    “…Abstract HfOx‐based resistive random‐access‐memory (ReRAM) devices (TiN/Ti/HfOx/RuOx/TiN) are fabricated by CMOS‐compatible materials (ruthenium (Ru)) and lithography‐lite process, potentially enabling a maskless, etching‐free process that can be implemented in the low earth orbit (LEO), the International Space Station (ISS), and commercial LEO destinations (CLDs). …”
    Get full text
    Article
  3. 1803

    Neuromorphic principles for machine olfaction by Nik Dennler, Aaron True, André van Schaik, Michael Schmuker

    Published 2025-01-01
    “…Considering the physical characteristics of turbulent odour environments, we argue that event-driven signal processing is optimally suited to the inherent properties of olfactory signals. …”
    Get full text
    Article
  4. 1804

    SERVICE AND SECURITY MONITORING IN CLOUD by Cristian IVANUŞ, Stefan IOVAN

    Published 2015-05-01
    “…In the cloud computing context, Quality of Software (QoS) is defined as the extent to which user requirements are met by the providers of cloud resources. …”
    Get full text
    Article
  5. 1805

    Biomimetic model for computing missing data imputation and inconsistency reduction in pairwise comparisons matrices. by Waldemar W Koczkodaj, Witold Pedrycz, Alexander Pigazzini, Laura P Pigazzini

    Published 2025-01-01
    “…A biomimetic model is presented to compute missing data imputation and reduce inconsistencies in pairwise comparisons matrices. …”
    Get full text
    Article
  6. 1806
  7. 1807
  8. 1808

    On the Partial Offloading to Multiple Helpers-Based Task Offloading for IoT Networks by Usman Mahmood Malik, Muhammad Awais Javed, Abdulaziz AlMohimeed, Mohammed Alkhathami, Abeer Almujalli

    Published 2024-01-01
    “…By using distributed fog computing, data obtained from sensors can be timely processed and different tasks can be computed efficiently. …”
    Get full text
    Article
  9. 1809

    Assessing the Relevance of Cloud Computing for Micro, Small and Medium Enterprises in the Northern Region of India by Devesh Kumar, Harsh Vardhan Samalia, Piyush Verma

    Published 2018-01-01
    “…In such a scenario, cloud computing can be an appropriate option for such MSMEs which are looking for improving their internal processes, enhancing communication with clients and business partners, and extending their market reach through modern ICT solutions with minimum investment and efforts. …”
    Get full text
    Article
  10. 1810

    Polymeric Memristors as Entropy Sources for Probabilistic Bit Generation by Stephen H. Foulger, Yuriy Bandera, Igor Luzinov, Travis Wanless

    Published 2025-04-01
    “…Abstract Probabilistic bits, or p‐bits, represent a novel computational element that bridges the gap between deterministic classical bits and quantum bits (qubits) used in quantum computing. …”
    Get full text
    Article
  11. 1811
  12. 1812

    Physics-Based SPICE-Compatible Compact Model of FLASH Memory With Poly-Si Channel for Computing-in-Memory Applications by Jung Rae Cho, Donghyun Ryu, Donguk Kim, Wonjung Kim, Yeonwoo Kim, Changwook Kim, Yoon Kim, Myounggon Kang, Jiyong Woo, Dae Hwan Kim

    Published 2025-01-01
    “…Moreover, considering recent FLASH memory fabrication processes, we found that grain boundaries in polycrystalline silicon channel materials can be involved in deteriorating gate controllability. …”
    Get full text
    Article
  13. 1813

    Intelligent Photolithography Corrections Using Dimensionality Reductions by Parag Parashar, Chandni Akbar, Tejender S. Rawat, Sparsh Pratik, Rajat Butola, Shih H. Chen, Yung-Sung Chang, Sirapop Nuannimnoi, Albert S. Lin

    Published 2019-01-01
    “…In this work, we use dimensionality reduction (DR) algorithms to reduce the computation time of complex OPC/EPC problems while the prediction accuracy is maintained. …”
    Get full text
    Article
  14. 1814

    Analog Computing for Nonlinear Shock Tube PDE Models: Test and Measurement of CMOS Chip by Hasantha Malavipathirana, Soumyajit Mandal, Nilan Udayanga, Yingying Wang, S. I. Hariharan, Arjuna Madanayake

    Published 2025-01-01
    “…Driven by observed non-trivial improvements in performance over digital processors while solving linear partial differential equations (PDEs), this paper presents experimental results and analysis from a single-chip CMOS analog computer for solving nonlinear PDEs. …”
    Get full text
    Article
  15. 1815

    Blockchain-based computing and wireless communication resource joint management double auction model by Yan SUN, Ao XIONG, Chengling JIANG, Wei WANG, Dongxiao YU, Shaoyong GUO

    Published 2022-11-01
    “…In wireless communication networks, the stock of spectrum, computing, storage and other resources at the edge was limited.The traditional decentralized and exclusive resource allocation resulted in weak resource reuse capability and low utilization rate.At the same time, it was difficult to ensure the fairness of resource sharing in the traditional resource scheduling process due to the lack of trust between the owners.First, a double auction model of computing and wireless communication resource joint management based on blockchain was proposed.In the model, a resource market was established, in which resource buyers and sellers allocated resources through double auctions.Secondly, blockchain was used to store the resource information of buyers and sellers to solve the mutual trust problem of all parties in the network.Finally, the experimental simulation was carried out to verify that the proposed model effectively improved the system performance and resource utilization efficiency.…”
    Get full text
    Article
  16. 1816

    Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing by Yinghui ZHANG, Sirui ZHANG, Qiuxia ZHAO, Xiaokun ZHENG, Jin CAO

    Published 2024-02-01
    “…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
    Get full text
    Article
  17. 1817

    Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing by Yinghui ZHANG, Sirui ZHANG, Qiuxia ZHAO, Xiaokun ZHENG, Jin CAO

    Published 2024-02-01
    “…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
    Get full text
    Article
  18. 1818

    Computing the Matrix G of Multi-Dimensional Markov Chains of M/G/1 Type by Valeriy Naumov, Konstantin Samouylov

    Published 2025-04-01
    “…This study aims to develop an effective algorithm for computing matrices <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mstyle mathvariant="bold" mathsize="normal"><mi>G</mi></mstyle></semantics></math></inline-formula> for <i>M</i>d-M/G/1 processes.…”
    Get full text
    Article
  19. 1819

    Research on secure transport strategy of mobile edge computing based on deep reinforcement learning by WANG Yijun, LI Jiaxin, YAN Zhiying, LYU Jingying, QIAN Zhihong

    Published 2025-04-01
    “…In mobile edge computing, the process of task unloading will face security problems such as information leakage and eavesdropping. …”
    Get full text
    Article
  20. 1820

    Cloud Computing for Improving Work Efficiency at the Belibi Village Government Office in the Era of Transformation by Kurniasih Mika, Ocky Sundari Rahardjo

    Published 2025-08-01
    “…This study aims to describe the implementation process of cloud computing, identify the challenges faced, and formulate strategies to improve work efficiency in the Belibi Village Government Office. …”
    Get full text
    Article