Showing 981 - 1,000 results of 28,739 for search '"computability"', query time: 0.07s Refine Results
  1. 981

    Computational Modelling Approaches on Epigenetic Factors in Neurodegenerative and Autoimmune Diseases and Their Mechanistic Analysis by Afroza Khanam Irin, Alpha Tom Kodamullil, Michaela Gündel, Martin Hofmann-Apitius

    Published 2015-01-01
    “…This review examines the major milestones in epigenetics research in the context of diseases and various computational approaches developed in the last decades to unravel new epigenetic modifications. …”
    Get full text
    Article
  2. 982
  3. 983
  4. 984

    Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants by Junchi Ma, Dengyun Yu, Yun Wang, Zhenbo Cai, Qingxiang Zhang, Cheng Hu

    Published 2016-01-01
    “…Soft error caused by single event upset has been a severe challenge to aerospace-based computing. Silent data corruption (SDC) is one of the results incurred by soft error. …”
    Get full text
    Article
  5. 985
  6. 986

    Computer Vision with Error Estimation for Reduced Order Modeling of Macroscopic Mechanical Tests by Franck Nguyen, Selim M. Barhli, Daniel Pino Muñoz, David Ryckelynck

    Published 2018-01-01
    “…In this paper, computer vision enables recommending a reduced order model for fast stress prediction according to various possible loading environments. …”
    Get full text
    Article
  7. 987

    Research on distributed multi-access edge computing based on mimic defense theory by Hongyi ZHU, Xiaoyuan LU, Yi LI

    Published 2019-09-01
    Subjects: “…multi-access edge computing…”
    Get full text
    Article
  8. 988

    Ultrafast silicon photonic reservoir computing engine delivering over 200 TOPS by Dongliang Wang, Yikun Nie, Gaolei Hu, Hon Ki Tsang, Chaoran Huang

    Published 2024-12-01
    “…Abstract Reservoir computing (RC) is a powerful machine learning algorithm for information processing. …”
    Get full text
    Article
  9. 989
  10. 990
  11. 991
  12. 992

    Immune computing-based base station location planning in the TD-SCDMA network by ZHU Si-feng1, LIU Fang1, CHAI Zheng-yi1

    Published 2011-01-01
    “…To reduce the cost of TD-SCDMA network construction,a solution of base station location planning problem based on immune computing was proposed.The difficulties of TD-SCDMA base station construction and the principle of location planning were expound,clonal multiplication operator,clonal mutation and clonal selection operator with real-number encoding were designed,the framework of immune memory clonal algorithm for base station location plan-ning problem was given,and simulation experiments were done to validate the proposed algorithm.Experimental result shows that the proposed solution can obtain higher network coverage rate with lower cost of network construction rela-tively,and has the advantage of good application value.…”
    Get full text
    Article
  13. 993
  14. 994

    Aware Computing in Spatial Language Understanding Guided by Cognitively Inspired Knowledge Representation by Masao Yokota

    Published 2012-01-01
    “…Applied Computational Intelligence and Soft Computing…”
    Get full text
    Article
  15. 995
  16. 996
  17. 997
  18. 998

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article
  19. 999
  20. 1000