Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
981
Computational Modelling Approaches on Epigenetic Factors in Neurodegenerative and Autoimmune Diseases and Their Mechanistic Analysis
Published 2015-01-01“…This review examines the major milestones in epigenetics research in the context of diseases and various computational approaches developed in the last decades to unravel new epigenetic modifications. …”
Get full text
Article -
982
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
983
-
984
Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants
Published 2016-01-01“…Soft error caused by single event upset has been a severe challenge to aerospace-based computing. Silent data corruption (SDC) is one of the results incurred by soft error. …”
Get full text
Article -
985
Retracted: Optimization of the Marketing Management System Based on Cloud Computing and Big Data
Published 2024-01-01Get full text
Article -
986
Computer Vision with Error Estimation for Reduced Order Modeling of Macroscopic Mechanical Tests
Published 2018-01-01“…In this paper, computer vision enables recommending a reduced order model for fast stress prediction according to various possible loading environments. …”
Get full text
Article -
987
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01Subjects: “…multi-access edge computing…”
Get full text
Article -
988
Ultrafast silicon photonic reservoir computing engine delivering over 200 TOPS
Published 2024-12-01“…Abstract Reservoir computing (RC) is a powerful machine learning algorithm for information processing. …”
Get full text
Article -
989
-
990
Joint intelligent optimization of task offloading and service caching for vehicular edge computing
Published 2021-01-01Subjects: Get full text
Article -
991
Utility-driven based co-allocation resource reservation strategy in computational grid
Published 2014-05-01Subjects: “…grid computing…”
Get full text
Article -
992
Immune computing-based base station location planning in the TD-SCDMA network
Published 2011-01-01“…To reduce the cost of TD-SCDMA network construction,a solution of base station location planning problem based on immune computing was proposed.The difficulties of TD-SCDMA base station construction and the principle of location planning were expound,clonal multiplication operator,clonal mutation and clonal selection operator with real-number encoding were designed,the framework of immune memory clonal algorithm for base station location plan-ning problem was given,and simulation experiments were done to validate the proposed algorithm.Experimental result shows that the proposed solution can obtain higher network coverage rate with lower cost of network construction rela-tively,and has the advantage of good application value.…”
Get full text
Article -
993
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing
Published 2025-01-01Subjects: Get full text
Article -
994
Aware Computing in Spatial Language Understanding Guided by Cognitively Inspired Knowledge Representation
Published 2012-01-01“…Applied Computational Intelligence and Soft Computing…”
Get full text
Article -
995
SIMULACIÓN DE UN MODELO DE EQUILIBRIO GENERAL COMPUTABLE PARA VENEZUELA
Published 2012-01-01Subjects: “…equilibrio general computable…”
Get full text
Article -
996
A Novel Computational Method to Reduce Leaky Reaction in DNA Strand Displacement
Published 2015-01-01Get full text
Article -
997
Quantum computational infusion in extreme learning machines for early multi-cancer detection
Published 2025-02-01Get full text
Article -
998
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article -
999
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
Published 2025-01-01Subjects: “…edge computing…”
Get full text
Article -
1000
Classification of Autism Disorder Severity Using Fuzzy Methods Based on Soft Computing
Published 2023-03-01Get full text
Article