Showing 121 - 140 results of 28,739 for search '"computational"', query time: 0.08s Refine Results
  1. 121

    AUTOMATION OF INVENTORY PROCESS OF PERSONAL COMPUTERS by A. I. Zaharenko, A. V. Vashetin

    Published 2013-11-01
    “…The modern information infrastructure of a large or medium-sized enterprise is inconceivable without an effective system of the computer equipment and fictitious assets inventory. …”
    Get full text
    Article
  2. 122
  3. 123

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  4. 124

    Accurate Assessment of Computed Order Tracking by P.N. Saavedra, C.G. Rodriguez

    Published 2006-01-01
    “…We have studied the computed order tracking (COT), and a new computed procedure is proposed for solving the indeterminate results generated by the traditional method at constant speed. …”
    Get full text
    Article
  5. 125
  6. 126
  7. 127

    On Computation of Entropy of Hex-Derived Network by Pingping Song, Haidar Ali, Muhammad Ahsan Binyamin, Bilal Ali, Jia-Bao Liu

    Published 2021-01-01
    “…In this article, we discuss hex-derived network of type 1 and 2, written as HDN 1n and HDN 2n, respectively of order n. We also compute some degree-based entropies such as Randić, ABC, and GA entropy of HDN 1n and HDN 2n.…”
    Get full text
    Article
  8. 128

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…Cloud computing is a new generation of technology which is designed to provide the commercial necessities, solve the IT management issues, and run the appropriate applications. …”
    Get full text
    Article
  9. 129

    Brain Computer Interface on Track to Home by Felip Miralles, Eloisa Vargiu, Stefan Dauwalder, Marc Solà, Gernot Müller-Putz, Selina C. Wriessnegger, Andreas Pinegger, Andrea Kübler, Sebastian Halder, Ivo Käthner, Suzanne Martin, Jean Daly, Elaine Armstrong, Christoph Guger, Christoph Hintermüller, Hannah Lowish

    Published 2015-01-01
    “…The novel BackHome system offers individuals with disabilities a range of useful services available via brain-computer interfaces (BCIs), to help restore their independence. …”
    Get full text
    Article
  10. 130
  11. 131

    Introduction to Grassmann manifolds and quantum computation by Kazuyuki Fujii

    Published 2002-01-01
    “…Geometrical aspects of quantum computing are reviewed elementarily for nonexperts and/or graduate students who are interested in both geometry and quantum computation. …”
    Get full text
    Article
  12. 132

    Robust Clustering Using Hyperdimensional Computing by Lulu Ge, Keshab K. Parhi

    Published 2024-01-01
    Subjects: “…Hyperdimensional computing (HDC)…”
    Get full text
    Article
  13. 133
  14. 134
  15. 135

    Computer mathematics systems in teaching process by Sigita Turskienė

    Published 2002-12-01
    “… The paper analyses possibilities of using computer mathematics systems in teaching process. The work surveys possibilities of using systems by teachers. …”
    Get full text
    Article
  16. 136

    Data Security and Privacy in Cloud Computing by Yunchuan Sun, Junsheng Zhang, Yongping Xiong, Guangyu Zhu

    Published 2014-07-01
    “…Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. …”
    Get full text
    Article
  17. 137
  18. 138
  19. 139

    Computer literacy of primary school teachers by Orinta Kiseliova

    Published 2003-12-01
    “…Today limited use of computers and lack of instruction programmes. …”
    Get full text
    Article
  20. 140

    Quantum computing for extracting nuclear resonances by Hantao Zhang, Dong Bai, Zhongzhou Ren

    Published 2025-01-01
    Subjects: “…Quantum computing…”
    Get full text
    Article