Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 2,941 - 2,960 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.27s Refine Results
  1. 2941
  2. 2942
  3. 2943
  4. 2944
  5. 2945

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  6. 2946

    Edge Cloud Resource Scheduling with Deep Reinforcement Learning by Y. Feng, M. Li, J. Li, Y. Yu

    Published 2025-04-01
    “…These challenges stem from the need to manage the vast amounts of information transmitted by IoT devices, as well as the necessity of offloading computational tasks to cloud data centers. To tackle this issue, we propose a novel deep reinforcement learning-based resource allocation method called Decima#, which offers an effective resource optimization solution for edge cloud data centers. …”
    Get full text
    Article
  7. 2947

    Emotion classification with multi‐modal physiological signals using multi‐attention‐based neural network by Chengsheng Zou, Zhen Deng, Bingwei He, Maosong Yan, Jie Wu, Zhaoju Zhu

    Published 2024-09-01
    “…Results demonstrated that the proposed network could effectively process four‐modal physiological signals and achieve high accuracy of emotion classification.…”
    Get full text
    Article
  8. 2948

    A Quantum Perceptron: A New Approach for Predicting Rice Prices at the Indonesian Wholesale Trade Level by Solikhun, Tri Yunita

    Published 2024-08-01
    “…The method focuses on developing models that can leverage quantum computing to process information more effectively than classical methods. …”
    Get full text
    Article
  9. 2949
  10. 2950

    Exploring Smartphone-Based Edge AI Inferences Using Real Testbeds by Matías Hirsch, Cristian Mateos, Tim A. Majchrzak

    Published 2025-05-01
    “…To empirically answer this, we use three pre-trained DL models and eight heterogeneous edge nodes including five low/mid-end smartphones and three SBCs, and compare the performance achieved using workloads from three image stream processing scenarios. Experiments were run with the help of a toolset designed for reproducing battery-driven edge computing tests. …”
    Get full text
    Article
  11. 2951
  12. 2952
  13. 2953
  14. 2954

    An Improved Ant Colony Optimization Approach for Optimization of Process Planning by JinFeng Wang, XiaoLiang Fan, Haimin Ding

    Published 2014-01-01
    “…Computer-aided process planning (CAPP) is an important interface between computer-aided design (CAD) and computer-aided manufacturing (CAM) in computer-integrated manufacturing environments (CIMs). …”
    Get full text
    Article
  15. 2955

    Calculation of coal cleats spacing for methane degassing by image processing by Adel Taheri, Farhang Sereshki, Fatemeh Sadat Rohani

    Published 2025-01-01
    “…Computer-based image processing technology was conducted to determine the coal cleats. …”
    Get full text
    Article
  16. 2956

    Overview of control-flow hijacking attack and defense techniques for process by Fengfeng WANG, Tao ZHANG, Weiguang XU, Meng SUN

    Published 2019-12-01
    “…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
    Get full text
    Article
  17. 2957

    Estimation of the Conditional Probability Using a Stochastic Gradient Process by Ali Labriji, Abdelkrim Bennar, Mostafa Rachik

    Published 2021-01-01
    “…Nevertheless, such a large volume of data is often accompanied by a significant need for computational capacity as well as a consequent compilation time. …”
    Get full text
    Article
  18. 2958
  19. 2959
  20. 2960

    Multi-wavelength optical information processing with deep reinforcement learning by Qiuquan Yan, Hao Ouyang, Zilong Tao, Meili Shen, Shiyin Du, Jun Zhang, Hengzhu Liu, Hao Hao, Tian Jiang

    Published 2025-04-01
    “…In systems based on dispersion compensating fiber, micro-ring resonator array, and Mach-Zehnder interferometer array that use multi-wavelength optical carriers as the light source, the DRC method enables the completion of the corresponding signal processing functions within 21 iterations. This method provides efficient and accurate control, making it suitable for applications such as optical convolution computation acceleration, microwave photonic signal processing, and optical network routing.…”
    Get full text
    Article