Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1341
Data comparable encryption scheme based on cloud computing in Internet of things
Published 2018-04-01“…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
Get full text
Article -
1342
Programmable composite pipeline structure supporting scheduling of integrated network and computing
Published 2025-07-01“…The heterogeneous resource allocation strategy was solved based on resource pricing and cooperative game to realize the flexible scheduling of computing and network resources in the process of data forwarding. …”
Get full text
Article -
1343
Capuchin search algorithm based task scheduling in cloud computing environment
Published 2022-03-01“…Cloud computing is mathematical process that provides more power and flexibility in computing infrastructure. …”
Get full text
Article -
1344
Multi-camera video collaborative analysis method based on edge computing
Published 2023-08-01Get full text
Article -
1345
Interface-engineered non-volatile visible-blind photodetector for in-sensor computing
Published 2025-01-01“…However, the storage and processing of information after detection require multiple components, resulting in increased energy consumption and data transmission latency. …”
Get full text
Article -
1346
Predicting Carbon Residual in Biomass Wastes Using Soft Computing Techniques
Published 2022-01-01Get full text
Article -
1347
Dual system trusted terminal computing architecture based on TPCM RoT
Published 2025-04-01“…The method ensured that the TPCM trusted root chip of the terminal device and the tested basic components were powered on first, completing the trusted measurement of the CPU execution environment, and controlling the CPU power and device initialization configuration, gradually performing trusted diffusion during the computer startup process. It can achieve reliable and trustworthy network applications while ensuring the security and trustworthiness of the device itself, realizing the privacy, security protection, and network security of device data.…”
Get full text
Article -
1348
Optimized Offloading in Vehicular Edge Computing: A Game Theoretic Analysis
Published 2025-01-01“…By leveraging nearby Multi-access Edge Computing (MEC) resources, VEC enhances data processing speed and reliability for applications like autonomous driving, real-time traffic management, and infotainment systems. …”
Get full text
Article -
1349
Distributed Optimization for Mobile Robots under Mobile Edge Computing Environment
Published 2021-01-01“…In this respect, mobile edge computing (MEC) technology and millimeter wave (mmW) technology can provide powerful support. …”
Get full text
Article -
1350
A model for aggregation and filtering on encrypted XML streams in fog computing
Published 2017-05-01“…Therefore, the proposed model is a solution to the fog computing applications in which the privacy preservation of sensor data is of great concern.…”
Get full text
Article -
1351
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
Get full text
Article -
1352
Key Considerations for Real-Time Object Recognition on Edge Computing Devices
Published 2025-07-01“…The rapid growth of the Internet of Things (IoT) and smart devices has led to an increasing demand for real-time data processing at the edge of networks closer to the source of data generation. …”
Get full text
Article -
1353
Towards Efficient Serverless MapReduce Computing on Cloud-Native Platforms
Published 2025-05-01“…Among them, due to its elasticity and ease-to-use, Serverless computing is one of the most promising directions of cloud-native technology. …”
Get full text
Article -
1354
Nonreciprocal surface plasmonic neural network for decoupled bidirectional analogue computing
Published 2025-08-01“…Our findings open pathways to nonreciprocal architectures for independent bidirectional algorithms in analogue computing.…”
Get full text
Article -
1355
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
Published 2024-12-01“…To address these limits, and to ensure a low task offloading delay, in this paper we propose PSO BS-Fog, a task offloading optimization that combines a particle swarm optimization (PSO) heuristic with fog computing technology for the IoD. The proposed solution applies the PSO for task offloading from unmanned aerial vehicles (UAVs) to fog base stations (FBSs) in order to optimize the offloading delay (transmission delay and fog computing delay) and to guarantee higher storage and processing capacity. …”
Get full text
Article -
1356
SOT-MRAM-based true in-memory computing architecture for approximate multiplication
Published 2025-06-01“…The in-memory computing (IMC) paradigm emerges as an effective solution to break the bottlenecks of conventional von Neumann architecture. …”
Get full text
Article -
1357
RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control
Published 2025-06-01“…As the number of service users increases, so does the demand for computational resources, leading data owners to outsource processing tasks to remote cloud servers. …”
Get full text
Article -
1358
A near-threshold memristive computing-in-memory engine for edge intelligence
Published 2025-07-01“…However, their scalability faces challenges, primarily due to process variation. Here, we report a 1-Mb, 16-macro near-threshold memristive computing-in-memory engine. …”
Get full text
Article -
1359
Blockchain-based heterogeneous resource configuration scheme in computing power network
Published 2025-07-01“…Abstract To provide users with on-demand computing and network resources while ensuring service quality, the concept of a computational power network has emerged. …”
Get full text
Article -
1360
Enhancing security in social computing systems through knowledge learning techniques
Published 2025-06-01“…Social computing systems (SCS) integrate social behaviour with computational hardware to enable conversations among technologies and individuals. …”
Get full text
Article