Search alternatives:
processor » process (Expand Search)
processes » process (Expand Search)
Showing 13,661 - 13,680 results of 30,198 for search '(processor OR processes) (computing)', query time: 0.27s Refine Results
  1. 13661

    Toward AI-Augmented Formal Verification: A Preliminary Investigation of ENGRU and Its Challenges by Chanon Dechsupa, Teerapong Panboonyuen, Wiwat Vatanawood, Praisan Padungweang, Chakchai So-In

    Published 2025-01-01
    “…State-space graphs and automata serve as fundamental tools for modeling and analyzing the behavior of computational systems. Recurrent neural networks (RNNs) and language models are deeply intertwined, as RNNS provide the foundational architecture that enables language models to process sequential data, capture contextual dependencies, and improve natural language processing tasks. …”
    Get full text
    Article
  2. 13662
  3. 13663

    A Perception-Driven Transcale Display Scheme for Space Image Sequences by Lingling Zi, Xin Cong, Yanfei Peng, Pei Yang

    Published 2018-01-01
    “…The former concentrates on describing the transcle feature of space targets, including three algorithms, attention region computing, frame rate conversion, and image resolution resizing. …”
    Get full text
    Article
  4. 13664
  5. 13665
  6. 13666
  7. 13667

    The Effectiveness and Clinical Usability of a Handheld Information Appliance by Patricia A. Abbott

    Published 2012-01-01
    “…This study was designed to gain a deeper understanding of clinicians’ interactions with a mobile clinical computing appliance (Motion Computing C5) designed to consolidate numerous technological functions into an all-in-one device. …”
    Get full text
    Article
  8. 13668

    IM-Dedup: An Image Management System Based on Deduplication Applied in DWSNs by Jilin Zhang, Shuting Han, Jian Wan, Baojin Zhu, Li Zhou, Yongjian Ren, Wei Zhang

    Published 2013-07-01
    “…It is suitable for cloud computing platform to apply service in data processing system. …”
    Get full text
    Article
  9. 13669

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  10. 13670
  11. 13671

    Distributed anonymous authentication scheme based on the blockchain in VANET by Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG

    Published 2022-09-01
    “…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
    Get full text
    Article
  12. 13672
  13. 13673
  14. 13674

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “…After a brief overview of the potentialities and drawbacks deriving from the combination of big data and cloud computing, this article illustrates the challenges and the obligations imposed by the European institutions on providers processing personal data – pursuant to the General Data Protection Regulation – and on providers of digital services and essential services – according to the NIS Directive. …”
    Get full text
    Article
  15. 13675
  16. 13676

    Quantum-mechanical prediction of the behavior of quantum trigger on a two-qubit cell of boron in silicene by Andrey N. Chibisov, Mary A. Chibisova

    Published 2025-06-01
    “…It was shown that the two-dimensional system B:Si behaves as a quantum switch, allowing operations on the local distribution of charge density and electrostatic potential, thereby processing quantum information. The obtained results will be important for the technology of designing and manufacturing two-dimensional energy-efficient quantum computer.…”
    Get full text
    Article
  17. 13677
  18. 13678
  19. 13679

    Enhancing UAS-Based Multispectral Semantic Segmentation Through Feature Engineering by Elena Vollmer, Mishal Benz, James Kahn, Leon Klug, Rebekka Volk, Frank Schultmann, Markus Gotz

    Published 2025-01-01
    “…This article investigates how feature engineering (FE), the process of adapting raw data to serve as DL training data, can impact performance when transferring prevalent model architectures to combined red, green, blue (RGB) thermal imagery. …”
    Get full text
    Article
  20. 13680

    Advanced gastrointestinal tract organ differentiation using an integrated swin transformer U-Net model for cancer care by Neha Sharma, Sheifali Gupta, Ahmad Almogren, Salil Bharany, Ayman Altameem, Ateeq Ur Rehman

    Published 2024-12-01
    “…This technology holds significant potential for integration into clinical processes, enhancing the precision of radiation therapy for GI cancer patients.…”
    Get full text
    Article