Showing 861 - 880 results of 26,849 for search 'evaluation computing', query time: 0.16s Refine Results
  1. 861

    Impact of computing platforms on classifier performance in heart disease prediction by Beenish Ayesha Akram, Muhammad Irfan, Amna Zafar, Sidra Khan, Rubina Shaheen

    Published 2025-04-01
    “…This work explores how different computing platforms influence the accuracy of classification results when employing the same models. …”
    Get full text
    Article
  2. 862
  3. 863

    TREE: Bridging the gap between reconfigurable computing and secure execution by Sérgio Pereira, Tiago Gomes, Jorge Cabral, Sandro Pinto

    Published 2025-06-01
    “… Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. …”
    Get full text
    Article
  4. 864

    Continual Learning With Neuromorphic Computing: Foundations, Methods, and Emerging Applications by Mishal Fatima Minhas, Rachmad Vidya Wicaksana Putra, Falah Awwad, Osman Hasan, Muhammad Shafique

    Published 2025-01-01
    “…After introducing the CL background and the energy efficiency challenges, we provide an extensive background of low-power neuromorphic computing systems including encoding techniques, neuronal dynamics, network architectures, learning rules, neuromorphic hardware processors, software and hardware frameworks, neuromorphic datasets, benchmarks, and evaluation metrics. …”
    Get full text
    Article
  5. 865

    Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing by Arief Setyanto, Theopilus Bayu Sasongko, Muhammad Ainul Fikri, Dhani Ariatmanto, I. Made Artha Agastya, Rakandhiya Daanii Rachmanto, Affan Ardana, In Kee Kim

    Published 2025-01-01
    “…Edge computing, a distributed computing paradigm that places small yet capable computing devices near data sources and IoT sensors, is gaining widespread adoption in various real-world applications, such as real-time intelligent drones, autonomous vehicles, and robotics. …”
    Get full text
    Article
  6. 866

    Mitigation of Corruption by Implementing e-Government Using Soft Computing by Shareef M. Shareef

    Published 2022-01-01
    “…We believe that a soft computing-fuzzy logic algorithm is an appropriate method for evaluating and determining the effective factors, and hence might lead to a feasible way to the success of e-government. …”
    Get full text
    Article
  7. 867

    FIST GEOINFORMATION SYSTEM MODEL USING FOG COMPUTING IN DESTABILIZATION by V. V. Gryzunov

    Published 2021-04-01
    “…The developed model and performance indicators can be used to design new and evaluate existing geographic information systems.…”
    Get full text
    Article
  8. 868

    A segment-based framework for explainability in animal affective computing by Tali Boneh-Shitrit, Lauren Finka, Daniel S. Mills, Stelio P. Luna, Emanuella Dalla Costa, Anna Zamansky, Annika Bremhorst

    Published 2025-04-01
    “…In this paper, we propose a framework aimed at enhancing explainability in the field of animal affective computing. Assuming the availability of a classifier for a specific affective state and the ability to generate saliency maps, our approach focuses on evaluating and comparing visual explanations by emphasizing the importance of meaningful semantic parts captured as segments, which are thought to be closely linked to behavioral indicators of affective states. …”
    Get full text
    Article
  9. 869
  10. 870

    SAPA-based approach for defending DoS attacks in cloud computing by Meng YUE, Kun LI, Zhi-jun WU

    Published 2017-04-01
    “…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
    Get full text
    Article
  11. 871

    Dynamic and Stochastic Models for Application Management in Distributed Computing Systems by Saleh M. Altowaijri

    Published 2025-02-01
    “…We developed multiple prototypes to investigate the organization of distributed applications under various system scales and workloads. To evaluate the system’s effectiveness and reliability, we computed steady-state probabilities using enhanced Markov models specifically designed for cloud, fog, and edge settings. …”
    Get full text
    Article
  12. 872

    Leveraging cognitive computing for advanced behavioral and emotional data insights by Chunhua Du, Wei Wang

    Published 2025-12-01
    “…Through comprehensive data analysis, we identify the primary factors driving current mental health concerns in student populations and evaluate the practical applications of cognitive computing in mitigating these issues. …”
    Get full text
    Article
  13. 873

    Dynamic Threshold-Based Resource Management for Fog Computing Environments by Jui-Pin Yang

    Published 2025-01-01
    “…To further support balanced workload distribution, a Quota-Based Round-Robin (QRR) scheduler is introduced, ensuring fairness and low computational overhead across fog nodes. Extensive experimental evaluations demonstrate that DTRM significantly reduces the resource redirection count compared to Static Threshold (ST), Deficit Round Robin (DRR), and Best-Effort (BE) schemes. …”
    Get full text
    Article
  14. 874

    Control of Linear-Threshold Brain Networks via Reservoir Computing by Michael McCreesh, Jorge Cortes

    Published 2024-01-01
    “…To mimic this setup, this paper examines the use of reservoir computing to control a linear-threshold network brain model to a desired trajectory. …”
    Get full text
    Article
  15. 875

    Edge Computing-Enabled Train Fusion Positioning: Modeling and Analysis by Hao Yin, Haifeng Song, Ruichao Wu, Min Zhou, Zixing Deng, Hairong Dong

    Published 2025-03-01
    “…An innovative approach, which combines multi-sensor information fusion with edge computing, is proposed to reduce the computational load on onboard systems and accelerate data processing. …”
    Get full text
    Article
  16. 876

    Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy by Saurabh Aggarwal, Ashish Khanna, Abhilash Maroju

    Published 2025-07-01
    “…The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. …”
    Get full text
    Article
  17. 877

    Reinforcement-Learning-Based Edge Offloading Orchestration in Computing Continuum by Ioana Ramona Martin, Gabriel Ioan Arcas, Tudor Cioara

    Published 2024-11-01
    “…The AI-driven applications and large data generated by IoT devices connected to large-scale utility infrastructures pose significant operational challenges, including increased latency, communication overhead, and computational imbalances. Addressing these is essential to shift the workloads from the cloud to the edge and across the entire computing continuum. …”
    Get full text
    Article
  18. 878

    NeuroMorse: a temporally structured dataset for neuromorphic computing by Ben Walters, Yeshwanth Bethi, Taylor Kergan, Binh Nguyen, Amirali Amirsoleimani, Jason K Eshraghian, Saeed Afshar, Mostafa Rahimi Azghadi

    Published 2025-01-01
    “…Neuromorphic engineering aims to advance computing by mimicking the brain’s efficient processing, where data is encoded as asynchronous temporal events. …”
    Get full text
    Article
  19. 879

    Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges by Junaid Ur Rehman, Muhammad Shohibul Ulum, Abdurrahman Wachid Shaffar, Amirul Adlil Hakim, Mujirin, Zaid Abdullah, Hayder Al-Hraishawi, Symeon Chatzinotas, Hyundong Shin

    Published 2025-01-01
    “…This ongoing progress creates an opportunity to implement and evaluate quantum-inspired metaheuristics on real quantum devices, with the aim of uncovering potential computational advantages. …”
    Get full text
    Article
  20. 880

    CMOS Single-Photon Avalanche Diode Circuits for Probabilistic Computing by William Whitehead, Wonsik Oh, Luke Theogarajan

    Published 2024-01-01
    “…Measured results from the SPAD design space show that even extremely small SPADs are suitable for probabilistic computing purposes, and that high dark count rates are not detrimental either, so SPADs for probabilistic computing are actually easier to integrate in standard CMOS processes. …”
    Get full text
    Article