Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
161
Representing unsegmented vessels using available vascular data for bioheat transfer simulation
Published 2025-02-01Subjects: “…computational biophysics…”
Get full text
Article -
162
User-Centered Computer Aided Language Learning /
Published 2006Subjects: “…Language and languages Computer-assisted instruction. 5677…”
Table of contents only
View in OPAC
Book -
163
-
164
Software watermarking scheme with cloud computing constraints
Published 2016-09-01Subjects: “…cloud computing…”
Get full text
Article -
165
Numerical methods of computation of singular and hypersingular integrals
Published 2001-01-01“…Therefore approximate methods of singular integrals calculation are an active developing direction of computing in mathematics. This review is devoted to the optimal with respect to accuracy algorithms of the calculation of singular integrals with fixed singularity, Cauchy and Hilbert kernels, polysingular and many-dimensional singular integrals. …”
Get full text
Article -
166
MINIMIZING THE NUMBER OF PROCESSING UNITS IN DISTRIBUTED COMPUTATIONS
Published 2016-09-01Get full text
Article -
167
Research on continuous monitoring of cloud computing service
Published 2016-10-01Subjects: “…cloud computing…”
Get full text
Article -
168
Hybrid data synchronization mechanism for mobile computing
Published 2016-08-01Subjects: “…mobile computing…”
Get full text
Article -
169
Survey on Data Center Network for Cloud Computing
Published 2014-02-01“…Data center network has faced several challenges from the arising of cloud computing.Along with the continuous expansive bandwidth requirements,data center network also should provide network isolation and service guarantee for each tenant.Current researches focued on the physical network,network virtualization and service guarantee were introduced.…”
Get full text
Article -
170
On the computation of the class numbers of some cubic fields
Published 1986-01-01Get full text
Article -
171
Backtesting Quantum Computing Algorithms for Portfolio Optimization
Published 2024-01-01Subjects: Get full text
Article -
172
On the Computation of the Efficient Frontier of the Portfolio Selection Problem
Published 2012-01-01“…An easy-to-use procedure is presented for improving the ε-constraint method for computing the efficient frontier of the portfolio selection problem endowed with additional cardinality and semicontinuous variable constraints. …”
Get full text
Article -
173
Survey of the teaching methods of human computer interaction
Published 2004-12-01“… The paper surveys teaching methods of both sciences and engineering that are implemented in the Human Computer Interaction courses. It deals with traditional lecture-based, case-based and pattern-based teaching. …”
Get full text
Article -
174
Password authentication scheme for mobile computing environment
Published 2007-01-01“…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
Get full text
Article -
175
A Stochastic Dynamic Model of Computer Viruses
Published 2012-01-01“…A stochastic computer virus spread model is proposed and its dynamic behavior is fully investigated. …”
Get full text
Article -
176
Fast Computation of Singular Oscillatory Fourier Transforms
Published 2014-01-01“…Based on substituting the original interval of integration by the paths of steepest descent, if f is analytic in the complex region G containing [a, b], the computation of integrals can be transformed into the problems of integrating two integrals on [0, ∞) with the integrand that does not oscillate and decays exponentially fast, which can be efficiently computed by using the generalized Gauss Laguerre quadrature rule. …”
Get full text
Article -
177
Remote Satellites Computing transmission and Key Technologies
Published 2022-06-01Subjects: “…computing transmission…”
Get full text
Article -
178
Service migration of heterogeneous cloud computing platform
Published 2020-12-01Subjects: “…cloud computing…”
Get full text
Article -
179
RETRACTED: Computer steganography and its basic principles
Published 2024-01-01Get full text
Article -
180
Computer data examination: the essence and procedural order
Published 2023-10-01Subjects: Get full text
Article