Search alternatives:
compositional » composition (Expand Search)
Showing 41 - 60 results of 52,129 for search '(compositional OR computational) data', query time: 0.33s Refine Results
  1. 41

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…Subtree results construction is a core problem in keyword query processing over XML data,for which com-puting the set of relevant keyword nodes (RKN) for each subtree's root node will greatly affect the overall system per-formance. …”
    Get full text
    Article
  2. 42

    Efficiently computing RKN for keyword queries on XML data by HENZi-yang C, ANGXuan W, ANGXian T

    Published 2014-07-01
    “…Subtree results construction is a core problem in keyword query processing over XML data,for which com-puting the set of relevant keyword nodes (RKN) for each subtree's root node will greatly affect the overall system per-formance. …”
    Get full text
    Article
  3. 43
  4. 44

    CONSTRUCTION PRINCIPLES OF COMPUTING UNITS FOR INTELLECTUAL DATA PROCESSING by M. M. Tatur

    Published 2016-09-01
    “…An approach to the development of problem-oriented parallel computers for a wide range of tasks of intelligent data processing is described. …”
    Get full text
    Article
  5. 45

    A COMPUTER TECHNIQUE FOR ANALYZING RADIO‐TELEMETRY DATA by Gregory. T. Koeln

    Published 1980-01-01
    “…Abstract An interactive computer system to analyze radio‐telemetry data has been developed and used on turkey observations. …”
    Get full text
    Article
  6. 46

    Trusted secure model for data services in cloud computing by Li-zhi XIONG, Zheng-quan XU, Xin GU

    Published 2014-10-01
    “…For trusted status of cloud service provider (CSP) and security requirements for data services in cloud computing,the trusted re-encryption secure model (TRSM) for cloud data services was proposed.Only with a certain trusted degree in CSP,cloud data security can be ensured by taking effective re-encryption schemes.The re-encryption secure model is verified by the classical cryptographic algorithms and analyzed by random oracles.Thus,the basic requirements of realizing re-encryption algorithm are got.Moreover,trusted evaluation model is proposed and used to dynamically evaluate CSP’s trusted status,provides theoretical basis and realization for establishment of trusted secure data services in cloud computing.…”
    Get full text
    Article
  7. 47
  8. 48

    Volumetric Denoising of XCT Data Using Quantum Computing by Thomas Lang, Anja Heim, Anastasia Papadaki, Kilian Dremel, Dimitri Prjamkov, Martin Blaimer, Markus Firsching, Stefan Kasperl, Theobald O.J. Fuchs

    Published 2025-02-01
    “…Noise, in particular, is an unavoidable issue that needs to be addressed when processing X-ray data. Therefore, this work considers the denoising of 3D volumetric data using quantum computing. …”
    Get full text
    Article
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54
  15. 55
  16. 56

    Dataset: Compositional analysis and hydrothermal liquefaction of a high-ash microalgae biofilmMendeley Data by Jacob D. Watkins, Hamza Abdellaoui, Elise Barton, Clayton Lords, Ronald C. Sims

    Published 2025-06-01
    “…This dataset contains biochemical composition data and hydrothermal liquefaction (HTL) yield results for a high-ash microalgae biofilm which was cultivated in effluent from a mesophilic anaerobic digester using polyethylene rotating algae biofilm reactors (RABRs). …”
    Get full text
    Article
  17. 57
  18. 58

    Predicting composition of a functional food product using computer simulation by M. A. Nikitina, I. M. Chernukha, M. P. Artamonova, A. T. Qusay

    Published 2025-02-01
    “…One of the frontiers of science is the development of a digital twin for a food product to predict composition and properties of a future product. Today, however, computer simulation (modeling) is used for predicting the composition of a food product. …”
    Get full text
    Article
  19. 59

    Programmable composite pipeline structure supporting scheduling of integrated network and computing by HOU Saifeng, CUI Pengshuai, HU Yuxiang, DONG Yongji, LIU Yi

    Published 2025-07-01
    “…The heterogeneous resource allocation strategy was solved based on resource pricing and cooperative game to realize the flexible scheduling of computing and network resources in the process of data forwarding. …”
    Get full text
    Article
  20. 60

    Reinforcement Learning for Data-driven Workflows in Radio Interferometry. I. Principal Demonstration in Calibration by Brian M. Kirk, Urvashi Rau, Ramyaa Ramyaa

    Published 2024-01-01
    “…These choices are typically based on a combination of measurable data characteristics, an understanding of the instrument itself, an appreciation of the trade-offs between compute cost and accuracy, and a learned understanding of what is considered best practice. …”
    Get full text
    Article