Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Business 6
- Computer security 4
- Design and construction 4
- Human-computer interaction 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Data processing 3
- Design 3
- Management 3
- Web sites 3
- BASIC (Computer program language) 2
- Cloud computing 2
- Computer simulation 2
- Data protection 2
- Digital techniques 2
- Education, Elementary 2
- Educational technology 2
- Handbooks, manuals, etc 2
- Internet 2
- Internet in education 2
- Java (Computer program language) 2
- Mass media 2
-
821
A Survey on Algorithms for Intelligent Computing and Smart City Applications
Published 2021-09-01Subjects: Get full text
Article -
822
Design method of secure computing protocol for deep neural network
Published 2020-08-01Subjects: Get full text
Article -
823
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
Published 2025-01-01Subjects: “…edge computing…”
Get full text
Article -
824
Joint scheduling algorithm for correlative tasks in multi-access edge computing
Published 2023-04-01Subjects: “…multi-access edge computing…”
Get full text
Article -
825
Revolutionizing load harmony in edge computing networks with probabilistic cellular automata and Markov decision processes
Published 2025-01-01Subjects: “…Edge computing…”
Get full text
Article -
826
Network media streaming offloading algorithm based on QoE in mobile edge network
Published 2024-02-01Subjects: “…mobile edge computing, quality of experience…”
Get full text
Article -
827
Leveraging cognitive computing for advanced behavioral and emotional data insights
Published 2025-12-01Subjects: “…Cognitive Computing…”
Get full text
Article -
828
Research on Virtual Machine Placement in Cloud Data Center
Published 2015-02-01Subjects: Get full text
Article -
829
Advanced numerical simulations of lid-driven cavity flows using an optimized parallelized fractional step method
Published 2025-03-01Subjects: Get full text
Article -
830
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01Subjects: “…cloud computing…”
Get full text
Article -
831
-
832
Reliable heuristic mapping method for survivable virtual network
Published 2015-07-01Subjects: “…cloud computing…”
Get full text
Article -
833
Facial masks and soft‐biometrics: Leveraging face recognition CNNs for age and gender prediction on mobile ocular images
Published 2021-09-01Subjects: Get full text
Article -
834
Bus Admittance Matrix Revisited: Performance Challenges on Modern Computers
Published 2024-01-01Subjects: Get full text
Article -
835
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01Subjects: Get full text
Article -
836
Pseudoexhaustive memory testing based on March A type march tests
Published 2020-06-01Subjects: “…testing of computing systems…”
Get full text
Article -
837
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Subjects: Get full text
Article -
838
-
839
Approach of glowworm swarm optimization based virtual machine placement
Published 2022-03-01Subjects: “…intelligent computing…”
Get full text
Article -
840