Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 4,261 - 4,280 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.22s Refine Results
  1. 4261

    Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed Clustering by Shatha A. Baker

    Published 2024-03-01
    “… Cloud computing has grown in popularity in recent years because to its efficiency, flexibility, scalability, and the services it provides for data storage and processing. …”
    Get full text
    Article
  2. 4262

    NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters by Peng Li, Chen Qing, Hao Liu

    Published 2025-04-01
    “…This optimization minimizes inter-stage processing discrepancies and maximizes resource utilization. …”
    Get full text
    Article
  3. 4263
  4. 4264
  5. 4265

    Multi-Area, Multi-Service and Multi-Tier Edge-Cloud Continuum Planning by Anargyros J. Roumeliotis, Efstratios Myritzis, Evangelos Kosmatos, Konstantinos V. Katsaros, Angelos J. Amditis

    Published 2025-06-01
    “…The goal is to evaluate the regional deployment of the compute continuum, i.e., the type and number of processing devices, their pairing with a specific tier and task among different areas subject to processing, rate, and latency requirements. …”
    Get full text
    Article
  6. 4266

    CONCEPTUAL FRAMEWORK OF ANALYSIS OF INFORMATION SECURITY MODELS OF CLOUD SYSTEMS OF THE CLASS «INFRASTRUCTURE AS A SERVICE» by E. V. Olizarovich, A. I. Brazhuk

    Published 2019-10-01
    “…A process based on the role approach for the synthesis of information security models of cloud computing systems based on applied system and threat models is described; the result is a security model, expressed, for example, in recommendations for improving information security or containing elements of the security configuration. …”
    Get full text
    Article
  7. 4267
  8. 4268
  9. 4269
  10. 4270

    Ion Intercalation‐Mediated MoS2 Conductance Switching for Highly Energy‐Efficient Memristor Synapse by Bin Zhao, Xuan Zhao, Xiaochen Xun, Fangfang Gao, Qi Li, Jiayi Sun, Tian Ouyang, Qingliang Liao, Yue Zhang

    Published 2025-05-01
    “…Abstract Emerging memristor synapses with ion dynamics have the potential to process spatiotemporal information and can accelerate the development of energy‐efficient neuromorphic computing. …”
    Get full text
    Article
  11. 4271

    Reconsidering big data security and privacy in cloud and mobile cloud systems by Lo'ai A. Tawalbeh, Gokay Saldamli

    Published 2021-09-01
    “…Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. Thirdly, we propose an efficient hybrid mobile cloud computing model based on cloudlets concept and we apply this model to health care systems as a case study. …”
    Get full text
    Article
  12. 4272

    Progressive filling partitioning and mapping algorithm for Spark based on allocation fitness degree by Chen BIAN, Jiong1 YU, Wei-rong XIU, Bin LIAO, Chang-tian YING, Yu-rong QIAN

    Published 2017-09-01
    “…The job execution mechanism of Spark was analyzed,task efficiency model and Shuffle model were established,then allocation fitness degree (AFD) was defined and the optimization goal was put forward.On the basis of the model definition,the progressive filling partitioning and mapping algorithm (PFPM) was proposed.PFPM established the data distribution scheme adapting Reducers’ computing ability to decrease synchronous latency during Shuffle process and increase cluster the computing efficiency.The experiments demonstrate that PFPM could improve the rationality of workload distribution in Shuffle and optimize the execution efficiency of Spark.…”
    Get full text
    Article
  13. 4273
  14. 4274

    Formal Description of Trusted Bebavior Oriented Security System for Big Data by Zhi Yan, Jing Zhan

    Published 2014-07-01
    “…Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. …”
    Get full text
    Article
  15. 4275

    Enhancing Cloud Resource Management Based on Intelligent System by Manal Fadhil Younis

    Published 2024-06-01
    “…Starting with designing a system based on a genetic algorithm (GA) as a computational tool to achieve the goal and plan a predictive request then depending on the round robin (RR) algorithm to allocate the requests for processing. …”
    Get full text
    Article
  16. 4276

    Energy-efficient optimization strategy based on elastic data migration in big data streaming platform by Yonglin PU, Xiaolong XU, Jiong YU, Ziyang LI, Binglei GUO

    Published 2024-02-01
    “…Focused on the problem that the stream computing platform was suffering from the high energy consumption and low efficiency due to the lack of consideration for energy efficiency in designing process, an energy-efficient optimization strategy based on elastic data migration in big data streaming platform (EEDM-BDSP) was proposed.Firstly, models of the load prediction and the resource judgment were set up, and the load prediction algorithm was designed, which predicted the load tendency and determine node resource occupancy, so as to find nodes of resource overload and redundancy.Secondly, models of the resource constraint and the optimal data migration were set up, and the optimal data migration algorithm was proposed, which data migration for the purpose of improving node resource utilization.Finally, model of the energy consumption was set up to calculate the energy consumption saved by the cluster after data migration.The experimental results show that the EEDM-BDSP changes node resources in the cluster can responded on time, the resource utilization and the energy-efficient are improved.…”
    Get full text
    Article
  17. 4277

    Application of machine learning algorithms in economic analysis by Mohammad Sadegh SALEM

    Published 2024-05-01
    “…These tasks require high computational accuracy and large-scale data processing, making classical systems time-consuming and costly. …”
    Get full text
    Article
  18. 4278

    Dynamic Traffic Engineering for Cooperative Fog-Cloud Environment: Trade-off Analysis of Cost and Utilization Under Different Load Conditions by Md. Rahinur Rahman, Mirza Mohd Shahriar Maswood

    Published 2024-09-01
    “…Despite its advantages, fog computing faces challenges due to the limited resources (CPU processing capacity, network bandwidth, memory, and power backup) of fog nodes. …”
    Get full text
    Article
  19. 4279

    Understanding the functional roles of modelling components in spiking neural networks by Huifeng Yin, Hanle Zheng, Jiayi Mao, Siyuan Ding, Xing Liu, Mingkun Xu, Yifan Hu, Jing Pei, Lei Deng

    Published 2024-01-01
    “…Specifically, we find that the leakage plays a crucial role in balancing memory retention and robustness, the reset mechanism is essential for uninterrupted temporal processing and computational efficiency, and the recurrence enriches the capability to model complex dynamics at a cost of robustness degradation. …”
    Get full text
    Article
  20. 4280

    Edge-assisted UAV onboard video compression and transmission for efficient inference of patrolling tasks by YANG Peng, LIANG Yuxin, KONG Yuxin, LIU Mingliu

    Published 2024-12-01
    “…Due to the limited UAV onboard computational resources, a lightweight RoI extraction method based on class activation mapping (CAM) was proposed, which was able to rapidly locate areas containing patrolling targets. …”
    Get full text
    Article