Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1001
Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Published 2024-01-01“…However, the potential of quantum computing is tempered by challenges in current noisy intermediate-scale quantum era machines. …”
Get full text
Article -
1002
Computation of Ice Shedding Trajectories Using Cartesian Grids, Penalization, and Level Sets
Published 2011-01-01Get full text
Article -
1003
-
1004
A computational approach for prediction of viscosity of chemical compounds based on molecular structures
Published 2025-01-01Get full text
Article -
1005
Computational Modelling Approaches on Epigenetic Factors in Neurodegenerative and Autoimmune Diseases and Their Mechanistic Analysis
Published 2015-01-01“…This review examines the major milestones in epigenetics research in the context of diseases and various computational approaches developed in the last decades to unravel new epigenetic modifications. …”
Get full text
Article -
1006
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
1007
-
1008
Detecting Silent Data Corruptions in Aerospace-Based Computing Using Program Invariants
Published 2016-01-01“…Soft error caused by single event upset has been a severe challenge to aerospace-based computing. Silent data corruption (SDC) is one of the results incurred by soft error. …”
Get full text
Article -
1009
Retracted: Optimization of the Marketing Management System Based on Cloud Computing and Big Data
Published 2024-01-01Get full text
Article -
1010
Computer Vision with Error Estimation for Reduced Order Modeling of Macroscopic Mechanical Tests
Published 2018-01-01“…In this paper, computer vision enables recommending a reduced order model for fast stress prediction according to various possible loading environments. …”
Get full text
Article -
1011
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01Subjects: “…multi-access edge computing…”
Get full text
Article -
1012
Ultrafast silicon photonic reservoir computing engine delivering over 200 TOPS
Published 2024-12-01“…Abstract Reservoir computing (RC) is a powerful machine learning algorithm for information processing. …”
Get full text
Article -
1013
-
1014
Joint intelligent optimization of task offloading and service caching for vehicular edge computing
Published 2021-01-01Subjects: Get full text
Article -
1015
Utility-driven based co-allocation resource reservation strategy in computational grid
Published 2014-05-01Subjects: “…grid computing…”
Get full text
Article -
1016
Immune computing-based base station location planning in the TD-SCDMA network
Published 2011-01-01“…To reduce the cost of TD-SCDMA network construction,a solution of base station location planning problem based on immune computing was proposed.The difficulties of TD-SCDMA base station construction and the principle of location planning were expound,clonal multiplication operator,clonal mutation and clonal selection operator with real-number encoding were designed,the framework of immune memory clonal algorithm for base station location plan-ning problem was given,and simulation experiments were done to validate the proposed algorithm.Experimental result shows that the proposed solution can obtain higher network coverage rate with lower cost of network construction rela-tively,and has the advantage of good application value.…”
Get full text
Article -
1017
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing
Published 2025-01-01Subjects: Get full text
Article -
1018
Aware Computing in Spatial Language Understanding Guided by Cognitively Inspired Knowledge Representation
Published 2012-01-01“…Applied Computational Intelligence and Soft Computing…”
Get full text
Article -
1019
SIMULACIÓN DE UN MODELO DE EQUILIBRIO GENERAL COMPUTABLE PARA VENEZUELA
Published 2012-01-01Subjects: “…equilibrio general computable…”
Get full text
Article -
1020
A Novel Computational Method to Reduce Leaky Reaction in DNA Strand Displacement
Published 2015-01-01Get full text
Article