Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,121 - 1,140 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.24s Refine Results
  1. 1121

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  2. 1122

    Optimization strategies in NOMA-based vehicle edge computing network by Jianbo DU, Nana XUE, Yan SUN, Jing JIANG, Shulei LI, Guangyue LU

    Published 2021-03-01
    “…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
    Get full text
    Article
  3. 1123

    Cognitive Computing and Business Intelligence Applications in Accounting, Finance and Management by Sio-Iong Ao, Marc Hurwitz, Vasile Palade

    Published 2025-02-01
    “…Cognitive computing encompasses computing tools and methods that simulate and mimic the process of human thinking, without human supervision. …”
    Get full text
    Article
  4. 1124
  5. 1125

    Integrating Reconfigurable Hardware-Based Grid for High Performance Computing by Julio Dondo Gazzano, Francisco Sanchez Molina, Fernando Rincon, Juan Carlos López

    Published 2015-01-01
    “…FPGAs have shown several characteristics that make them very attractive for high performance computing (HPC). The impressive speed-up factors that they are able to achieve, the reduced power consumption, and the easiness and flexibility of the design process with fast iterations between consecutive versions are examples of benefits obtained with their use. …”
    Get full text
    Article
  6. 1126
  7. 1127
  8. 1128
  9. 1129
  10. 1130
  11. 1131

    An Autonomous Planning Model for Deploying IoT Services In Fog Computing by Mansoureh Zare, Yasser Elmi sola, Hesam Hasanpour

    Published 2024-02-01
    “…Therefore, processing, analysis and storage are closer to the source of data and end users cause the delay is reduced. …”
    Get full text
    Article
  12. 1132

    Flash Memory for Synaptic Plasticity in Neuromorphic Computing: A Review by Jisung Im, Sangyeon Pak, Sung-Yun Woo, Wonjun Shin, Sung-Tae Lee

    Published 2025-02-01
    “…These devices enable in-memory computing, helping to overcome the “von Neumann bottleneck”, a limitation caused by the separation of memory and processing units in traditional von Neumann architecture. …”
    Get full text
    Article
  13. 1133

    Authorization delegation mechanism based trust level in grid computing by DENG Yong1, CHEN Jian-gang 1, WANG Ru-chuan1, ZHANG Lin1

    Published 2008-01-01
    “…To meet the demand of the delegation service during multi-domain authorization in grid computing,the dele-gation negotiation process is presented to realize the authorization delegation of role and permission based on the RBDM and RT model through the introduction of trust levels.The fine-grain authorization delegation policy is given.Finally,the simulation is given to prove the feasibility of the delegation model with trust level.…”
    Get full text
    Article
  14. 1134

    Diffluent Internet Traffic and Characteristics Computation Based on Hadoop by Yong Liu, Jiangtao Luo, Shengxiong Deng, Xiaoping Wang

    Published 2014-12-01
    “…In order to solve the problems of poor expansibility and high cost that caused by the traditional stand-alone, an internet traffic characteristics analysis method based on MapReduce, which parallel processes diffluent internet traffic and characteristics computing, was proposed. …”
    Get full text
    Article
  15. 1135

    Multitask Analysis Method for Tongue Image Based on Edge Computing by Tingting Song, Bin Liu, Fengen Yuan, Yunfeng Wang, Kang Yu, Hao Yang, Qiuyan Li

    Published 2025-01-01
    “…Additionally, the model exhibits advantages in terms of quantity and scale, saving both storage and computational resources. It not only enhances the accuracy and efficiency of tongue image real-time analysis in edge computing scenarios but also reduces the processing time, providing excellent precision and inference speed.…”
    Get full text
    Article
  16. 1136

    Virtualization Security, Key Issues of Public Cloud Computing Security by Jiaren Jiang

    Published 2015-12-01
    “…With the prosperous development of information technologies and popularity of information-based on a global basis, public application and service of cloud computing has become a trend and inevitable part of enterprise growth.Only an enterprise is speeding up the process,which is playing an increasingly important role in the enterprise growth. …”
    Get full text
    Article
  17. 1137

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  18. 1138

    Technology development mode of communication/sensing/computing/intelligence integration by Xiangyang DUAN, Li YANG, Shuqiang XIA, Zhiqiang HAN, Feng XIE

    Published 2022-03-01
    “…Various new functions and services related to communication/sensing/computing/intelligence have been targeted, developed and fused into the existing 5G-Advanced and emerging 6G new system.The technical scenarios and use cases of communication/sensing/computing/intelligence integration and its expectation for technique mode requirementin 5G-Advanced and 6G different phases were addressed, meanwhile five characteristics of its technology development mode were extracted.The proposed viewpoints may guide the research and development of 5G-Advanced system and standardization process of 6G new system in future, leading to more effective and profitable applications and maximization of business value from communication/sensing/computing/intelligence integration.…”
    Get full text
    Article
  19. 1139

    NOMA enable network optimization scheme of mobile edge computing by Feng Shaohua, Chen Qinghua, Ouyang Zhonghui, Li Zhao

    Published 2022-04-01
    “…Mobile edge computing(MEC) enables an intelligent terminal to transfer part of the computing load to the edge server located in the base station subsystem to solve the problem of mass data processing in IoT network. …”
    Get full text
    Article
  20. 1140

    Design and Research of Photonic Reservoir Computing for Optical Channel Equalization by Xiaoyan Zuo, Li Pei, Bing Bai, Bowen Bai, Jianshuai Wang, Quan Li, Run Yang

    Published 2025-04-01
    “…These architectures leverage optical computing instead of electrical computing to reduce computational pressure at the receiver and decrease processing latency. …”
    Get full text
    Article