Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,141 - 1,160 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.20s Refine Results
  1. 1141

    Design method of secure computing protocol for deep neural network by Renwan BI, Qianxin CHEN, Jinbo XIONG, Ximeng LIU

    Published 2020-08-01
    “…Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.…”
    Get full text
    Article
  2. 1142

    Metasurface-Based Optical Analog Computing: From Fundamentals to Applications by Dingyu Xu, Shuangchun Wen, Hailu Luo

    Published 2022-01-01
    “…With unprecedented growth in data information over the past few decades, it is critically important to seek a faster and more efficient method to simplify data processing. In recent years, optical analog computing provides an available way due to its large capacity, energy saving, and high efficiency. …”
    Get full text
    Article
  3. 1143

    Building method of distributed COW disk on network computing environment by Huai-liang TAN, Zheng LUO, Zai-hong HE, Ren-fa LI

    Published 2012-07-01
    “…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
    Get full text
    Article
  4. 1144

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
    Get full text
    Article
  5. 1145

    Construction and optimization of a smart classroom system for emotional computing by HUANG Lijuan, CHENG Zhengyi, YANG Ziyan

    Published 2024-06-01
    “…Finally, through verification, the multiple resources joint optimization method of the smart classroom system can effectively reduce the maximum delay of device data collection and processing, greatly improve the real-time performance of emotional computing in the smart classroom system, and avoid blindly pursuing the minimum average delay, effectively avoiding the situation where a single user experienced poorly due to poor real-time performance. …”
    Get full text
    Article
  6. 1146

    Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme by DUAN Jie, GU Wei, ZHANG Shujuan, GONG Xin

    Published 2025-05-01
    “…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. However, cloud computing is no longer able to meet the current data processing requirements. …”
    Get full text
    Article
  7. 1147

    Resource Management Across Edge Server in Mobile Edge Computing by Saifur Rahman, Mazhar Hussain, Syed Ibad Ali Shah, Zaiwar Ali, Muhammad Ayaz Khan, Grzegorz Nowakowski, Marek Sieja, Muhammad Irfan, Fazal Muhammad

    Published 2024-01-01
    “…Mobile Edge Computing (MEC) has the potential to provide computational resources to edge devices. …”
    Get full text
    Article
  8. 1148

    Cloud Computing Services: Benefits, Risks and Intellectual Property Issues by IONELA BĂLŢĂTESCU

    Published 2014-05-01
    “…Patent strategy of certain proprietary software companies leaded to a veritable “patent war” and “patent arm race” endangering the process of standardization in software industry, especially in cloud computing. …”
    Get full text
    Article
  9. 1149

    Scope for Applications Management in India of Soft Computing in effective Classroom by Souren Bhattacharya, Subhasree Pal, Parimal Sarkar

    Published 2022-01-01
    “…Soft computing has the potential to address the issues.…”
    Get full text
    Article
  10. 1150

    Hybrid quantum and in-memory computing for accelerating solving Simon’s problem by Zheng Miao, Yongxiang Li, Shiqing Wang, Zhong Sun

    Published 2025-06-01
    “…While quantum algorithms can exponentially reduce the complexity of Simon’s problem, the overall computational complexity remains O(n3), which is imposed by the process of solving a system of linear equations in modulo 2 arithmetic (Mod-2 LEs). …”
    Get full text
    Article
  11. 1151

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
    Get full text
    Article
  12. 1152

    NeuroMorse: a temporally structured dataset for neuromorphic computing by Ben Walters, Yeshwanth Bethi, Taylor Kergan, Binh Nguyen, Amirali Amirsoleimani, Jason K Eshraghian, Saeed Afshar, Mostafa Rahimi Azghadi

    Published 2025-01-01
    “…Neuromorphic engineering aims to advance computing by mimicking the brain’s efficient processing, where data is encoded as asynchronous temporal events. …”
    Get full text
    Article
  13. 1153

    Cognitive Computing with Large Language Models for Student Assessment Feedback by Noorhan Abbas, Eric Atwell

    Published 2025-04-01
    “…While traditional assessment methods emphasise both achievements and development areas, the process remains time-intensive for educators. This research explores the application of cognitive computing, specifically open-source Large Language Models (LLMs) Mistral-7B and CodeLlama-7B, to streamline feedback generation for student reports containing both Python programming elements and English narrative content. …”
    Get full text
    Article
  14. 1154

    Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges by M. Sunil Kumar, D. Ganesh

    Published 2024-09-01
    “…It explores how IoT-enabled medical devices facilitate continuous remote patient monitoring and real-time health data collection and emphasizes the role of wearable devices comprising smartwatches and fitness trackers in elevating data accuracy and offering personalized health insights. Cloud computing's key role in telemedicine is investigated through its scalable data storage and processing capabilities, which manage the vast amounts of data generated by IoT devices. …”
    Get full text
    Article
  15. 1155

    TREE: Bridging the gap between reconfigurable computing and secure execution by Sérgio Pereira, Tiago Gomes, Jorge Cabral, Sandro Pinto

    Published 2025-06-01
    “… Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. …”
    Get full text
    Article
  16. 1156

    Energy-Accuracy Trade-Offs for Resistive In-Memory Computing Architectures by Saion K. Roy, Naresh R. Shanbhag

    Published 2024-01-01
    “…Resistive in-memory computing (IMC) architectures currently lag behind SRAM IMCs and digital accelerators in both energy efficiency and compute density due to their low compute accuracy. …”
    Get full text
    Article
  17. 1157

    Economic and Management Applications of Brain – Computer Interface Technology by Oana Stefania Cosa, Daniela Georgiana Golea, Felix Constantin Goldbach

    Published 2024-12-01
    “…By processing real-time neural signals, the study explores how BCI can support decision-making processes, automate repetitive tasks, and monitor employees’ cognitive performance. …”
    Get full text
    Article
  18. 1158

    Enhancing Scientific Research and Innovation: The role of the Computer Educator. by Chukwuma Mgboji, Nannim Fadip, Nnenna Ibezim

    Published 2022-12-01
    “…There is need for expertise in these processes. In this descriptive study, 40 Computer Educators were surveyed and their responses showed that computer educators play a prominent role in the pyramid chain of scientific research and innovation. …”
    Get full text
    Article
  19. 1159
  20. 1160