Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1,341 - 1,360 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.22s Refine Results
  1. 1341

    Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG

    Published 2018-04-01
    “…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
    Get full text
    Article
  2. 1342

    Programmable composite pipeline structure supporting scheduling of integrated network and computing by HOU Saifeng, CUI Pengshuai, HU Yuxiang, DONG Yongji, LIU Yi

    Published 2025-07-01
    “…The heterogeneous resource allocation strategy was solved based on resource pricing and cooperative game to realize the flexible scheduling of computing and network resources in the process of data forwarding. …”
    Get full text
    Article
  3. 1343

    Capuchin search algorithm based task scheduling in cloud computing environment by Sivakumar Ramu, Rameshkumar Ranganathan, Ramakrishnan Ramamoorthy

    Published 2022-03-01
    “…Cloud computing is mathematical process that provides more power and flexibility in computing infrastructure. …”
    Get full text
    Article
  4. 1344
  5. 1345

    Interface-engineered non-volatile visible-blind photodetector for in-sensor computing by Ge Li, Donggang Xie, Qinghua Zhang, Mingzhen Zhang, Zhuohui Liu, Zheng Wang, Jiahui Xie, Erjia Guo, Meng He, Can Wang, Lin Gu, Guozhen Yang, Kuijuan Jin, Chen Ge

    Published 2025-01-01
    “…However, the storage and processing of information after detection require multiple components, resulting in increased energy consumption and data transmission latency. …”
    Get full text
    Article
  6. 1346
  7. 1347

    Dual system trusted terminal computing architecture based on TPCM RoT by HUANG Jianhui, ZHANG Jiangjiang, SHEN Changxiang, ZHANG Jianbiao

    Published 2025-04-01
    “…The method ensured that the TPCM trusted root chip of the terminal device and the tested basic components were powered on first, completing the trusted measurement of the CPU execution environment, and controlling the CPU power and device initialization configuration, gradually performing trusted diffusion during the computer startup process. It can achieve reliable and trustworthy network applications while ensuring the security and trustworthiness of the device itself, realizing the privacy, security protection, and network security of device data.…”
    Get full text
    Article
  8. 1348

    Optimized Offloading in Vehicular Edge Computing: A Game Theoretic Analysis by Abdelkarim Ait Temghart, Mbarek Marwan, Mohamed Baslam

    Published 2025-01-01
    “…By leveraging nearby Multi-access Edge Computing (MEC) resources, VEC enhances data processing speed and reliability for applications like autonomous driving, real-time traffic management, and infotainment systems. …”
    Get full text
    Article
  9. 1349

    Distributed Optimization for Mobile Robots under Mobile Edge Computing Environment by Hui Luo, Quan Yin

    Published 2021-01-01
    “…In this respect, mobile edge computing (MEC) technology and millimeter wave (mmW) technology can provide powerful support. …”
    Get full text
    Article
  10. 1350

    A model for aggregation and filtering on encrypted XML streams in fog computing by Jyun-Yao Huang, Wei-Chih Hong, Po-Shin Tsai, I-En Liao

    Published 2017-05-01
    “…Therefore, the proposed model is a solution to the fog computing applications in which the privacy preservation of sensor data is of great concern.…”
    Get full text
    Article
  11. 1351

    Empowering drones in vehicular network through fog computing and blockchain technology. by Shivani Wadhwa, Divya Gupta, Shalli Rani, Maha Driss, Wadii Boulila

    Published 2025-01-01
    “…Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
    Get full text
    Article
  12. 1352

    Key Considerations for Real-Time Object Recognition on Edge Computing Devices by Nico Surantha, Nana Sutisna

    Published 2025-07-01
    “…The rapid growth of the Internet of Things (IoT) and smart devices has led to an increasing demand for real-time data processing at the edge of networks closer to the source of data generation. …”
    Get full text
    Article
  13. 1353

    Towards Efficient Serverless MapReduce Computing on Cloud-Native Platforms by Xu Huang, Rong Gu, Yihua Huang

    Published 2025-05-01
    “…Among them, due to its elasticity and ease-to-use, Serverless computing is one of the most promising directions of cloud-native technology. …”
    Get full text
    Article
  14. 1354

    Nonreciprocal surface plasmonic neural network for decoupled bidirectional analogue computing by Xiaomeng Li, Haochen Yang, Enzong Wu, Xincheng Yao, Ying Li, Fei Gao, Hongsheng Chen, Zuojia Wang

    Published 2025-08-01
    “…Our findings open pathways to nonreciprocal architectures for independent bidirectional algorithms in analogue computing.…”
    Get full text
    Article
  15. 1355

    Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones by Sofiane Zaidi, Mohamed Amine Attalah, Lazhar Khamer, Carlos T. Calafate

    Published 2024-12-01
    “…To address these limits, and to ensure a low task offloading delay, in this paper we propose PSO BS-Fog, a task offloading optimization that combines a particle swarm optimization (PSO) heuristic with fog computing technology for the IoD. The proposed solution applies the PSO for task offloading from unmanned aerial vehicles (UAVs) to fog base stations (FBSs) in order to optimize the offloading delay (transmission delay and fog computing delay) and to guarantee higher storage and processing capacity. …”
    Get full text
    Article
  16. 1356

    SOT-MRAM-based true in-memory computing architecture for approximate multiplication by Min Song, Qilong Tang, Xintong Ouyang, Wei Duan, Yan Xu, Shuai Zhang, Long You

    Published 2025-06-01
    “…The in-memory computing (IMC) paradigm emerges as an effective solution to break the bottlenecks of conventional von Neumann architecture. …”
    Get full text
    Article
  17. 1357

    RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control by Urvashi Rahul Saxena, Rajan Kadel

    Published 2025-06-01
    “…As the number of service users increases, so does the demand for computational resources, leading data owners to outsource processing tasks to remote cloud servers. …”
    Get full text
    Article
  18. 1358

    A near-threshold memristive computing-in-memory engine for edge intelligence by Linfang Wang, Weizeng Li, Zhidao Zhou, Junjie An, Wang Ye, Zhi Li, Hanghang Gao, Hongyang Hu, Jing Liu, Xiaoming Chen, Ling Li, Qi Liu, Mingoo Seok, Chunmeng Dou, Ming Liu

    Published 2025-07-01
    “…However, their scalability faces challenges, primarily due to process variation. Here, we report a 1-Mb, 16-macro near-threshold memristive computing-in-memory engine. …”
    Get full text
    Article
  19. 1359

    Blockchain-based heterogeneous resource configuration scheme in computing power network by Qiang Gao, Chunyu Liu, Lei Wang, Yiqing Liu, Yueqiang Xu

    Published 2025-07-01
    “…Abstract To provide users with on-demand computing and network resources while ensuring service quality, the concept of a computational power network has emerged. …”
    Get full text
    Article
  20. 1360

    Enhancing security in social computing systems through knowledge learning techniques by Anitha Rajesh, Ramamurthy DineshKumar, Saranya Shanmugam, Jaehyuk Cho, Sathishkumar Veerappampalayam Easwaramoorthy

    Published 2025-06-01
    “…Social computing systems (SCS) integrate social behaviour with computational hardware to enable conversations among technologies and individuals. …”
    Get full text
    Article