Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,001 - 1,020 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.30s Refine Results
  1. 1001

    Parallel Monte Carlo computations in SCore environment by Svajonė Vošterienė

    Published 2004-12-01
    “… Parallel Monte Carlo (PMC) methods are successful because particles are typically independent and easily distributed to multiple processors. We use the PC Cluster TAURAS [1] with the SCore cluster system software on top of Linux OS to present the strategy for parallelizing Monte Carlo calculations. …”
    Get full text
    Article
  2. 1002

    No-Regret Learning and Equilibrium Computation in Quantum Games by Wayne Lin, Georgios Piliouras, Ryann Sim, Antonios Varvitsiotis

    Published 2024-12-01
    “…As quantum processors advance, the emergence of large-scale decentralized systems involving interacting quantum-enabled agents is on the horizon. …”
    Get full text
    Article
  3. 1003
  4. 1004
  5. 1005
  6. 1006

    On-Chip Reconfigurable Hardware Accelerators for Popcount Computations by Valery Sklyarov, Iouliia Skliarova, João Silva

    Published 2016-01-01
    “…Popcount computations are widely used in such areas as combinatorial search, data processing, statistical analysis, and bio- and chemical informatics. …”
    Get full text
    Article
  7. 1007

    WorkflowHub: a registry for computational workflows by Ove Johan Ragnar Gustafsson, Sean R. Wilkinson, Finn Bacall, Stian Soiland-Reyes, Simone Leo, Luca Pireddu, Stuart Owen, Nick Juty, José M. Fernández, Tom Brown, Hervé Ménager, Björn Grüning, Salvador Capella-Gutierrez, Frederik Coppens, Carole Goble

    Published 2025-05-01
    “…Abstract The rising popularity of computational workflows is driven by the need for repetitive and scalable data processing, sharing of processing know-how, and transparent methods. …”
    Get full text
    Article
  8. 1008

    DETERMINATION OF STEEL GRAIN GRADE BY COMPUTER METHODS by A. G. Anisovich, I. N. Rumyantseva, L. V. Bisluk

    Published 2010-09-01
    “…The necessity of correlation of GOST requirements and computer programs of images processing is discussed.…”
    Get full text
    Article
  9. 1009

    THE ROLE OF COMPUTED TOMOGRAPHY IN THE DIAGNOSIS OF RETROPERITONEAL FIBROSIS by A. O. Rudnev, M. N. Maxim, V. B. Vizhgorodsky, A. V. Kiryushin, S. Yu. Kotans

    Published 2018-06-01
    “…Although the final diagnosis can be made only on the basis of biopsy, computed tomography is of great importance for the evaluation of the pathological process, it allows diagnosing the disease, assessing its prevalence and observing the dynamics during treatment. …”
    Get full text
    Article
  10. 1010

    Computed Tomography in the Diagnosis of Neonatal Lung Diseases by S. A. Perepelitsa, V. Yu. Kanykin, S. V Goncharov, Ye. F. Smerdova, A. M. Golubev

    Published 2009-04-01
    “…CT established the pattern of a pathological process in the lung. It clarified the nature of the disease in all the cases. …”
    Get full text
    Article
  11. 1011
  12. 1012
  13. 1013
  14. 1014

    Monitored Reconstruction: Computed Tomography as an Anytime Algorithm by Konstantin Bulatov, Marina Chukalina, Alexey Buzmakov, Dmitry Nikolaev, Vladimir V. Arlazarov

    Published 2020-01-01
    “…Computed tomography is an important technique for non-destructive analysis of an object’s internal structure, relevant for scientific studies, medical applications, and industry. …”
    Get full text
    Article
  15. 1015

    Computer modeling of rectangular-cylindrical trawl doors by Victor I. Gabruk, Ivan A. Kornienko, Vasily V. Kudakaev, Svetlana V. Zhigulskaya, Kseniya G. Frankovskaya

    Published 2015-06-01
    “…Computer modeling of the rectangular-cylindrical trawl doors designed by P.P. …”
    Get full text
    Article
  16. 1016

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  17. 1017

    Parameter estimation and model selection in computational biology. by Gabriele Lillacci, Mustafa Khammash

    Published 2010-03-01
    “…A central challenge in computational modeling of biological systems is the determination of the model parameters. …”
    Get full text
    Article
  18. 1018

    COMPUTER VIBRATION MONITORING OF MACHINERY AND TURBINE UNITS by P. J. Brancevich, S. F. Kastsiuk, Y. N. Bazyleu

    Published 2019-06-01
    “…The hardware-software organization of computer multichannel systems of vibration control is considered. …”
    Get full text
    Article
  19. 1019

    Computational Work with Very Large Text Collections by John Unsworth

    Published 2011-06-01
    “…The argument of the piece is that interoperability is a process as well as a state, that it requires mechanisms that would sustain it, and that TEI is one of those mechanisms.…”
    Get full text
    Article
  20. 1020