Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 13,621 - 13,640 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.24s Refine Results
  1. 13621
  2. 13622

    Advanced methodologies and technologies in government and society /

    Published 2019
    Table of Contents: “…Kamel -- Socio-economic processes, user generated content, and media pluralism / Androniki Kavoura -- Bipolar model in collective choice / Ayeley P. …”
    View in OPAC
    Book
  3. 13623

    Advanced methodologies and technologies in government and society /

    Published 2019
    Table of Contents: “…Kamel -- Socio-economic processes, user generated content, and media pluralism / Androniki Kavoura -- Bipolar model in collective choice / Ayeley P. …”
    View in OPAC
    Book
  4. 13624
  5. 13625

    Convolutional neural networks for sea surface data assimilation in operational ocean models: test case in the Gulf of Mexico by O. Zavala-Romero, O. Zavala-Romero, A. Bozec, E. P. Chassignet, J. R. Miranda, J. R. Miranda

    Published 2025-01-01
    “…<p>Deep learning models have demonstrated remarkable success in fields such as language processing and computer vision, routinely employed for tasks like language translation, image classification, and anomaly detection. …”
    Get full text
    Article
  6. 13626

    Efficient and real-time lane detection using CUDA-based implementation by El Boussaki Hoda, Latif Rachid, Saddik Amine

    Published 2024-01-01
    “…However, given its high computational demands, optimization of this process is essential for real-time applications. …”
    Get full text
    Article
  7. 13627
  8. 13628

    Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM by Kais Belwafi, Abdulhadi Shoufan, Mariam Alsafi, Ashfaq Ahmed, Kyusuk Han

    Published 2024-01-01
    “…The proposed architecture consists of four key modules: a Zero-Trust Processor (ZTP) with an RV64 core, a Zero-Trust Management (ZTM) unit with an RV32 core featuring Certificate and Secret Storage (CSS) and a Certificate Management Unit (CMU). …”
    Get full text
    Article
  9. 13629
  10. 13630

    Research on Development Progress and Test Evaluation of Post-Quantum Cryptography by Meng Zhang, Jing Wang, Junsen Lai, Mingfu Dong, Zhenzhong Zhu, Ryan Ma, Jun Yang

    Published 2025-02-01
    “…This paper first analyzes the threat of quantum computing to existing cryptographic systems, then introduces in detail the main technical routes of PQC and its standardization process. …”
    Get full text
    Article
  11. 13631
  12. 13632
  13. 13633
  14. 13634
  15. 13635
  16. 13636

    A novel pythonic paradigm for image encryption using axis-aligned bounding boxes by Abdulbasid Banga, Akifa Abbas, Danish Ali, Nisreen Innab, Ala Saleh Alluhaidan, Nadeem Iqbal, Hossam Diab

    Published 2025-05-01
    “…If the boxes do not overlap, the pixels within them are swapped. This pixel-swapping process, guided by random numbers generated from a 5D multi-wing hyper-chaotic map, is repeated numerous times to infuse confusion into the image. …”
    Get full text
    Article
  17. 13637
  18. 13638

    Digital traceability in horticulture: a systematic review of edge-cloud-blockchain-terminal (ECBT) integration with IoT and AI technologies by Yan Huang, Xin Li, Luyi Xu, Yongqiang Ma

    Published 2025-08-01
    “…This systematic mini-review examines the Edge-Cloud-Blockchain-Terminal (ECBT) framework—an integrated architecture positioning blockchain as the trust backbone connecting distributed computing, edge intelligence, and user terminals—for comprehensive traceability. …”
    Get full text
    Article
  19. 13639

    Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme by Meng Wu, Xiufeng Zhao, Weitao Song

    Published 2025-03-01
    “…Enhancing the efficiency of bootstrapping necessitates a dual focus: reducing the computational burden of outer product operations integral to the process while rigorously constraining the noise generated by bootstrapping within predefined threshold limits. …”
    Get full text
    Article
  20. 13640