Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 2,921 - 2,940 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.22s Refine Results
  1. 2921
  2. 2922
  3. 2923

    Design and validation for a remote attestation security protocol by WANG Dan, WEI Jin-feng, ZHOU Xiao-dong

    Published 2009-01-01
    “…By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.…”
    Get full text
    Article
  4. 2924

    Exploration and Practice of Cloud Platform About Supporting Telecom Operators Intensive Management by Jingwei Yang, Lin Hu, Jinling Li, Zhiyong Liu

    Published 2013-08-01
    “…One solution was presented that telecom operators can achieve whole network resource intensive management by building centralized and unified cloud platform.Some problems were analyzed in detail and further resolved when bringing into and managing resource.The unified management,unified dispatch and unified presentation of resource by decentralization of authority and domain can be achieved,automatic opening of service by means of process connection can be achieved.The usage and use efficiency of monitored resource were also discussed combined with the actual application in cloud computer platform,which can provide evidence for intensive usage of resource.…”
    Get full text
    Article
  5. 2925

    Principles and metrics of extreme learning machines using a highly nonlinear fiber by Hary Mathilde, Brunner Daniel, Leybov Lev, Ryczkowski Piotr, Dudley John M., Genty Goëry

    Published 2025-06-01
    “…These are highly relevant findings for the dimensioning of future, ultrafast optical computing systems that can capture and process sequential input information on femtosecond timescales.…”
    Get full text
    Article
  6. 2926
  7. 2927

    Design of OpenFOAM mesh generation client software based on C/S architecture by Zhang Zhida, Huai Xiaoyong, Gao Ruochen

    Published 2022-02-01
    “…To meet the requirements of human-computer interaction of OpenFOAM deployed in the cloud GUI, this paper designs and implements an OpenFOAM mesh generation client software. …”
    Get full text
    Article
  8. 2928
  9. 2929
  10. 2930
  11. 2931
  12. 2932
  13. 2933
  14. 2934
  15. 2935
  16. 2936
  17. 2937
  18. 2938
  19. 2939

    A Survey on Deepfake Video Detection by Peipeng Yu, Zhihua Xia, Jianwei Fei, Yujiang Lu

    Published 2021-11-01
    Subjects: “…computer crime…”
    Get full text
    Article
  20. 2940