Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 4,581 - 4,600 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.28s Refine Results
  1. 4581

    Distributed trusted demand response bidding mechanism empowered by blockchain by Lei Wang, Tong Li, Chao Yang, Jiang Chen, Yang Liu, Shuai Ren

    Published 2024-09-01
    “…In the demand response process involving multi-agent participation, multiple parties’ interests are involved and response execution status supervision is required. …”
    Get full text
    Article
  2. 4582

    Adaptive high frequency data streaming for Soft Real-Time Industrial AI: A scalable microservices based architecture with dynamic downsampling by Telmo Fernández De Barrena, Alcides Fernandes, Juan Luis Ferrando, Ander García, Hugo Landaluce, Ignacio Angulo

    Published 2025-09-01
    “…The rapid adoption of Internet of Things (IoT) devices and Edge computing has increased the demand for efficient processing of high-frequency sensor data. …”
    Get full text
    Article
  3. 4583
  4. 4584

    A retrieval strategy of load balancing optimization scheme for CESM based on matrix nesting by A retrieval strategy of load balancing optimization scheme for CESM based on matrix nesting

    Published 2022-01-01
    “…The load imbalance between each meteorological sub module and component of CESM makes its computing performance unsatisfactory. It is not realistic to retrieve the optimal layout manually by enumerating parameters because the diversity of available process layout schemes will lead to a huge amount of retrieval. …”
    Get full text
    Article
  5. 4585

    RS-DRL-based offloading policy and UAV trajectory design in F-MEC systems by Yulu Yang, Han Xu, Zhu Jin, Tiecheng Song, Jing Hu, Xiaoqin Song

    Published 2025-04-01
    “…For better flexibility and greater coverage areas, Unmanned Aerial Vehicles (UAVs) have been applied in Flying Mobile Edge Computing (F-MEC) systems to offer offloading services for the User Equipment (UEs). …”
    Get full text
    Article
  6. 4586

    Enabling the Ocean Internet of Things with Renewable Marine Energy by Mathew Topper, Nicolas Jarnoux, Ronan Costello, Cian Murtagh, Simone Giorgi, Ben Kennedy

    Published 2025-06-01
    “…The 'thing' is any offshore device which can collect and process data in situ, while the 'internet' represents the medium for transmitting data. …”
    Get full text
    Article
  7. 4587

    Cache Contention Aware Virtual Machine Placement and Mitigation Using Adaptive ABC Algorithm by Bharati Ainapure, Nishu Gupta, Mohammad Derawi

    Published 2025-01-01
    “…By optimizing the migration process with a focus on these critical factors, it ensures minimal computational overhead and optimal memory performance. …”
    Get full text
    Article
  8. 4588
  9. 4589

    All-optical combinational logical units featuring fifth-order cascade by Haiqi Gao, Yu Shao, Yipeng Chen, Junren Wen, Yuchuan Shao, Yueguang Zhang, Weidong Shen, Chenying Yang

    Published 2024-12-01
    “…This innovative design exhibits increased processing speed, improved energy efficiency, robust environmental stability, and high error tolerance, making it exceptionally well-suited for a broad spectrum of applications in optical computing and communications. …”
    Get full text
    Article
  10. 4590

    FQsun: A Configurable Wave Function-Based Quantum Emulator for Power-Efficient Quantum Simulations by Tuan Hai Vu, Vu Trung Duong Le, Hoai Luan Pham, Quoc Chuong Nguyen, Yasuhiko Nakashima

    Published 2025-01-01
    “…Quantum computers are promising powerful computers for solving complex problems, but access to real quantum hardware remains limited due to high costs. …”
    Get full text
    Article
  11. 4591

    Reliable, efficient, and scalable photonic inverse design empowered by physics-inspired deep learning by Shao Guocheng, Zhou Tiankuang, Yan Tao, Guo Yanchen, Zhao Yun, Huang Ruqi, Fang Lu

    Published 2025-01-01
    “…On-chip computing metasystems composed of multilayer metamaterials have the potential to become the next-generation computing hardware endowed with light-speed processing ability and low power consumption but are hindered by current design paradigms. …”
    Get full text
    Article
  12. 4592

    Pulscan: Binary Pulsar Detection Using Unmatched Filters on NVIDIA GPUs by Jack White, Karel Adámek, Jayanta Roy, Scott M. Ransom, Wesley Armour

    Published 2025-01-01
    “…The computational demands of FDAS and FDJS make them challenging to implement in real-time detection pipelines, requiring costly high-performance computing facilities. …”
    Get full text
    Article
  13. 4593
  14. 4594

    Cloud-Driven Data Analytics for Growing Plants Indoor by Nezha Kharraz, István Szabó

    Published 2025-04-01
    “…The integration of cloud computing, IoT (Internet of Things), and artificial intelligence (AI) is transforming precision agriculture by enabling real-time monitoring, data analytics, and dynamic control of environmental factors. …”
    Get full text
    Article
  15. 4595

    GP4ESP: a hybrid genetic algorithm and particle swarm optimization algorithm for edge server placement by Fang Han, Hui Fu, Bo Wang, Yaoli Xu, Bin Lv

    Published 2024-10-01
    “…In addition, existing algorithms ignored the computing delay of edge servers (ESs) on request process, resulting in overestimation of the service quality. …”
    Get full text
    Article
  16. 4596
  17. 4597

    Delay and energy minimization for MEC-based secure communication by Pinyi REN, Qian XU

    Published 2020-11-01
    “…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
    Get full text
    Article
  18. 4598

    On privacy of property-based remote attestation by LI Shang-jie1, HE Ye-ping1, LIU Dong-mei1, YUAN Chun-yang3

    Published 2009-01-01
    “…Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However, property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact, the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed, which offered reference for the further research on property-based remote attestation.…”
    Get full text
    Article
  19. 4599
  20. 4600

    On privacy of property-based remote attestation by LI Shang-jie1, HE Ye-ping1, LIU Dong-mei1, YUAN Chun-yang3

    Published 2009-01-01
    “…Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However, property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact, the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed, which offered reference for the further research on property-based remote attestation.…”
    Get full text
    Article