Suggested Topics within your search.
Suggested Topics within your search.
- Management 5
- Data processing 4
- Information technology 3
- Moral and ethical aspects 3
- Anesthetics 2
- Cloud computing 2
- Computer networks 2
- Computer security 2
- Data protection 2
- Handbooks, manuals, etc 2
- Visual communication 2
- computer 2
- Agriculture 1
- Anesthesia 1
- Anesthesiology 1
- Anxiety Disorders 1
- Bildanalyse 1
- Bildwissenschaft 1
- Bioinformatics 1
- Business 1
- Business intelligence 1
- COMPUTERS / Internet / General 1
- COMPUTERS / Security / General 1
- Certification 1
- Children 1
- Civil rights 1
- Cognitive Therapy 1
- Communication 1
- Computer programs 1
- Computer scheduling 1
-
321
Lux: A Generative, Multioutput, Latent-variable Model for Astronomical Data with Noisy Labels
Published 2025-01-01Subjects: “…Astronomy data analysis…”
Get full text
Article -
322
-
323
-
324
scHiCTools: A computational toolbox for analyzing single-cell Hi-C data.
Published 2021-05-01“…We present an open-source computational toolbox, scHiCTools, for analyzing single-cell Hi-C data comprehensively and efficiently. …”
Get full text
Article -
325
A computational HLA allele-typing protocol to de-noise and leverage nanopore amplicon data
Published 2025-04-01“…Third generation DNA sequencing platforms such as Oxford Nanopore (ONT) offer the opportunity to deliver rapid results at single nucleotide level resolution, in particular sequencing data that could be denoised computationally. Here we present a computational pipeline for up-to third-field HLA allele typing following ONT sequencing. …”
Get full text
Article -
326
The Impact of LoRA Adapters on LLMs for Clinical Text Classification Under Computational and Data Constraints
Published 2025-01-01“…These findings demonstrate that, in low-resource clinical settings with limited data and compute, lightweight Transformers trained from scratch offer a more practical and efficient solution than large LLMs, while GRN remains a viable adapter choice when minimal adaptation is needed.…”
Get full text
Article -
327
Numerical Analysis of Damage in Composites: From Intra-Layer to Delamination and Data-Assisted Methods
Published 2025-05-01Subjects: “…composite…”
Get full text
Article -
328
Hyperresearch use in the compilation and analysis of qualitative data
Published 2001-08-01Get full text
Article -
329
An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set
Published 2025-01-01Get full text
Article -
330
Algorithm for Automating Input and Processing of Initial Data for Computer Forecasting of Spatial Migration of Radionuclides in Soils
Published 2023-09-01“…SPS uses the initial values of radionuclide concentrations, hydrological and thermal properties of soils and information about meteorological conditions as input data for forecasting. At the same time, the listed initial data must be previously collected, processed and converted into a form that the software able to work with. …”
Get full text
Article -
331
Efficient Processing of Continuous Skyline Query over Smarter Traffic Data Stream for Cloud Computing
Published 2013-01-01“…Strong computing ability and valid mass data management mode provided by the cloud computing, is feasible for handling Skyline continuous query in the mass distributed uncertain transportation data stream. …”
Get full text
Article -
332
Efficient computation and visualization of ionospheric volumetric images for the enhanced interpretation of Incoherent scatter radar data
Published 2025-06-01“…We present a novel fast computational strategy for the generation of high-resolution and smooth volumetric ionospheric images that represent ISR data. …”
Get full text
Article -
333
Research and application of innovative models for public data integration based on secure multi-party computation
Published 2023-11-01Subjects: “…secure multi-party computation;public data;innovative integration…”
Get full text
Article -
334
-
335
Design of Mobile Internet Big Data User Behavior Analysis Engine Based on Cloud Computing
Published 2013-03-01Subjects: Get full text
Article -
336
A Secure Key-Aggregate Keyword Retrieval Scheme Over Encrypted Data in Cloud Computing
Published 2025-01-01Get full text
Article -
337
Balancing Privacy and Accuracy: Exploring the Impact of Data Anonymization on Deep Learning Models in Computer Vision
Published 2024-01-01“…In recent years, the quality of training data has emerged as a critical factor for ensuring effectiveness in real-world scenarios. …”
Get full text
Article -
338
Intelligent data analysis in edge computing with large language models: applications, challenges, and future directions
Published 2025-05-01Subjects: “…edge computing…”
Get full text
Article -
339
-
340
Reduction of Energy Consumption in Mobile Cloud Computing by Classification of Demands and Executing in Different Data Centers
Published 2018-06-01“…By emerging mobile applications and cloud computing, Mobile Cloud Computing (MCC) has been introduced. …”
Get full text
Article