Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 5,321 - 5,340 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.28s Refine Results
  1. 5321

    La écfrasis en el Libro de Alexandre, un proyecto de edición digital para el estudio de la poesía clerical castellana del siglo XIII con minimal computing by Gabriel A. Calarco

    Published 2023-08-01
    “…Secondly, I describe the process of semantic enrichment of the text, the XML-TEI encoding, and the minimal computing approach. …”
    Get full text
    Article
  2. 5322
  3. 5323

    Multiple-Input Floating-Point Adders: A Comprehensive Review by Sami Ul Haq, Aiman H. El-Maleh, Ali Alsuwaiyan

    Published 2025-01-01
    “…Floating-point addition is pivotal in various computational applications, including scientific computing, machine learning, and graphics processing. …”
    Get full text
    Article
  4. 5324

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  5. 5325

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  6. 5326

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article
  7. 5327

    Differential privacy protection technology and its application in big data environment by Yu FU, Yihan YU, Xiaoping WU

    Published 2019-10-01
    “…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
    Get full text
    Article
  8. 5328

    Optimized Trust Prediction and Multi-Criteria Framework for Task and Data Collector Selection Using Deep Learning in Ubiquitous Environments by Ahmed A. A. Gad-Elrab

    Published 2025-01-01
    “…In crowdsourcing and ubiquitous computing environments, efficient task assignment and data collector selection are vital for system performance and profitability. …”
    Get full text
    Article
  9. 5329

    Modern trends in the formation of economic and organizational foundations for the construction and development of the digital economy in the Republic of Kazakhstan by Y. Beisembay, T. Y. Ernazarov

    Published 2021-03-01
    “…The assessment of the direct contribution of digitalization processes to the GDP of the Republic of Kazakhstan and economic growth was also carried out. …”
    Get full text
    Article
  10. 5330
  11. 5331
  12. 5332

    An all integer-based spiking neural network with dynamic threshold adaptation by Chenglong Zou, Chenglong Zou, Xiaoxin Cui, Shuo Feng, Guang Chen, Yi Zhong, Zhenhui Dai, Yuan Wang

    Published 2024-12-01
    “…Due to this all integer-based quantization process, the required computational operations are significantly reduced, potentially providing a substantial energy efficiency advantage for numerous edge computing applications.…”
    Get full text
    Article
  13. 5333
  14. 5334
  15. 5335

    The Future Is Organic: A Deep Dive into Techniques and Applications for Real-Time Condition Monitoring in SASO Systems—A Systematic Review by Tim Nolte, Sven Tomforde

    Published 2025-06-01
    “…By analyzing sensor data, CM enables systems to react to dynamic conditions, supporting the core principles of Organic Computing (OC): robustness, adaptability, and autonomy. …”
    Get full text
    Article
  16. 5336

    A Cloud Infrastructure for Health Monitoring in Emergency Response Scenarios by Alessandro Orro, Gian Angelo Geminiani, Francesco Sicurello, Marcello Modica, Francesco Pegreffi, Luca Neri, Antonio Augello, Matteo Botteghi

    Published 2024-10-01
    “…Cloud computing provides a solution with its built-in resilience and elasticity capabilities. …”
    Get full text
    Article
  17. 5337
  18. 5338

    Quantum-enhanced digital twin IoT for efficient healthcare task offloading by Ahmed K. Jameil, Hamed Al-Raweshidy

    Published 2025-05-01
    “…However, existing Digital Twin (DT)-based healthcare models suffer from high latency, inefficient resource allocation, cybersecurity vulnerabilities, and computational limitations when processing large-scale patient data. …”
    Get full text
    Article
  19. 5339

    The smartHEALTH European Digital Innovation Hub experiences and challenges for accelerating the transformation of public and private organizations within the innovation ecosystem by Dimitrios G. Katehakis, Dimitrios Filippidis, Konstantinos Karamanis, Angelina Kouroubali, Anastasia Farmaki, Pantelis Natsiavas, Anastasia Krithara, Eleni G. Christodoulou, Marios Antonakakis, Dimitris Plexousakis, Dimitris Plexousakis

    Published 2024-11-01
    “…To this end, this paper outlines smartHEALTH’s approach to attracting recipients and providing expert guidance on utilizing state-of-the-art technologies for innovative services, product development, and process creation to accelerate digital transformation.…”
    Get full text
    Article
  20. 5340