Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
361
CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING
Published 2016-09-01“…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
Get full text
Article -
362
A Novel Computational Framework for Visual Snow Syndrome
Published 2025-01-01Subjects: Get full text
Article -
363
Application of IoT and Cloud Computing in Automation of Agriculture Irrigation
Published 2022-01-01Get full text
Article -
364
Computing Exponential for Iterative Splitting Methods: Algorithms and Applications
Published 2011-01-01“…Iterative splitting methods have a huge amount to compute matrix exponential. Here, the acceleration and recovering of higher-order schemes can be achieved. …”
Get full text
Article -
365
Research on the method of virtual machine deployment in cloud computing
Published 2015-03-01Get full text
Article -
366
Computational Swarming: A Cultural Technique for Generative Architecture
Published 2014-11-01“…As a major, zoo-technological branch of ABM, Computational Swarm Intelligence (SI) coalesces all kinds of architectural elements – materials, people, environmental forces, traffic dynamics, etc. – into a collective population. …”
Get full text
Article -
367
Design of video recommender system based on cloud computing
Published 2013-09-01Subjects: Get full text
Article -
368
A Review of Computational Electromagnetic Methods for Graphene Modeling
Published 2016-01-01“…In this paper, a review of application of graphene in electronic and photonic device is provided, as well as some widely used computational electromagnetic algorithms for graphene modeling. …”
Get full text
Article -
369
Peculiarities of rendering of material in virtual computers' network course
Published 2004-12-01“… Problems of singling out the most important themes of distance computers' network course are analyzed in the present article. …”
Get full text
Article -
370
Trust-driven job scheduling heuristics for computing grid
Published 2006-01-01Subjects: “…grid computing…”
Get full text
Article -
371
Computational thinking for young indigenous learners in New Zealand
Published 2024-06-01Subjects: Get full text
Article -
372
Theoretical and Computational Advances in Nonlinear Dynamical Systems 2018
Published 2018-01-01Get full text
Article -
373
Network Restoration for Next-Generation Communication and Computing Networks
Published 2018-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
374
Trusted secure model for data services in cloud computing
Published 2014-10-01“…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
Get full text
Article -
375
Efficient algorithm for computing Walsh spectrum and differential probability
Published 2015-05-01“…According to the characteristic of T-functions,along with the definition of narrow T-functions,the linear prop-erty and differential property were studied.Markov chain and transition matrices were constructed to propose fast algo-rithm for computing Walsh spectrum and differential probability,of which the time complexity is O(n).In addition,the algorithm is applied in the T-functions in TSC-family and finally the result expression is given.…”
Get full text
Article -
376
Spatial Buffering Mechanism: Mathematical Model and Computer Simulations
Published 2005-09-01Get full text
Article -
377
Computing on the joint quadratic complexity of multiple periodic sequences
Published 2012-06-01“…An algorithm for determining the joint quadratic complexity of the prescribed multiple periodic sequences over any finite field was presented by using the algorithm for computing the quadratic complexity of the prescribed single sequence proposed by Rizomiliotis and the methods for determining the solutions of the linear equations.The total processing time requirement is cubics function of the sequence length at most.…”
Get full text
Article -
378
Critical considerations and computational tools in plant genome editing
Published 2025-01-01Subjects: “…Computational tools…”
Get full text
Article -
379
Modelling of Nonuniform RC Structures for Computer Aided Design
Published 1994-01-01“…The model can be easily implemented for computer-aided analysis and design of circuits and systems comprising nonuniform distributed RC structures.…”
Get full text
Article -
380
Ethical Considerations of Influencing Behavior Using Computer Technology
Published 2025-01-01Subjects: Get full text
Article