Showing 241 - 260 results of 7,728 for search '(programa OR programs) computational', query time: 0.25s Refine Results
  1. 241

    A Volunteer Computing Architecture for Computational Workflows on Decentralized Web by Alessia Antelmi, Giuseppe D'Ambrosio, Andrea Petta, Luigi Serra, Carmine Spagnuolo

    Published 2022-01-01
    “…The amount of accessible computational devices over the Internet offers an enormous but latent computational power. …”
    Get full text
    Article
  2. 242

    Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System by Vasiliki Liagkou, Panagiotis E. Nastou, Paul Spirakis, Yannis C. Stamatiou

    Published 2025-03-01
    “…The formal study of computer malware was initiated in the seminal work of Fred Cohen in the mid-80s, who applied elements of Computation Theory in the investigation of the theoretical limits of using the Turing Machine formal model of computation in detecting viruses. …”
    Get full text
    Article
  3. 243

    Non-Fungible Programs by Blake Regalia, Benjamin Adams

    Published 2025-08-01
    “…Here we introduce the Non-Fungible Program (NFP) model for developing self-contained frontend applications that are distributed via blockchain, powered by web technology, backed by encrypted databases, and controlled by confidential smart contracts. …”
    Get full text
    Article
  4. 244
  5. 245
  6. 246

    Determinación de los parámetros geométricos originales de ruedas dentadas cilíndricas de dientes rectos y helicoidales mediante programa de computación. // Determination of origina... by J. Randulfe Ceballos, M. Sánchez Castro, F. Hdez Sardiñas, M. Gómez Florido

    Published 2001-10-01
    “…When this information is unknown it is necessary to determine it, and in fact this is the content of this paper, starting<br />from mensurations of transmission parameters carried out and later and introduced as data in a computation program. En<br />few seconds the necessary values for the production of gears are obtained with much more precise values than using the<br />traditional methods in use by companies that are devoted to this function.…”
    Get full text
    Article
  7. 247
  8. 248
  9. 249

    Single-round performance of colorectal cancer screening programs: a network meta-analysis of randomized clinical trials by Teruhiko Terasawa, Toshihiro Tadano, Koichiro Abe, Seiju Sasaki, Satoyo Hosono, Takafumi Katayama, Keika Hoshi, Tomio Nakayama, Chisato Hamashima

    Published 2025-02-01
    “…Abstract Background Demonstrating mortality reduction in new colorectal cancer (CRC) screening programs through randomized clinical trials (RCTs) is challenging. …”
    Get full text
    Article
  10. 250

    Programming Mobile Applications by Nada Saleem, Mohammad Hamdy

    Published 2013-07-01
    “…These applications are programmed with J2ME language on mobiles, covered MIDP 2.0 with CLDC 1.0 executed on mobiles with versions Nokia 6600, Nokia 7610, N72 and executed on computers with the following operating systems Windows 7, Windows XP and Linux Mandriva 2010 .…”
    Get full text
    Article
  11. 251
  12. 252
  13. 253
  14. 254

    Historical perspective and opportunity for computing in memory using floating-gate and resistive non-volatile computing including neuromorphic computing by Jennifer Hasler, Arindam Basu

    Published 2025-01-01
    “…A historical perspective for illustrating FG and memristor/RRAM devices enables comparison of nonvolatile storage (addressing issues related to resolution, lifetime, endurance etc), feedforward computation (different variants of vector matrix multiplication, tradeoffs between power dissipation and signal to noise ratio etc), programming (addressing issues of selectivity, peripheral circuits, charge trapping etc), and learning algorithms (continuous time LMS or batch update), in these systems. …”
    Get full text
    Article
  15. 255
  16. 256

    On Signifiable Computability: Part II: An Axiomatization of Signifiable Computation and Debugger Theorems by Vladimir A. Kulyukin

    Published 2025-03-01
    “…The second theorem shows that there are functions signifiably computable in general that become partially signifiably computable when signified by programs on <inline-formula><math display="inline" xmlns="http://www.w3.org/1998/Math/MathML"><semantics><mi mathvariant="script">D</mi></semantics></math></inline-formula> insomuch as the memory capacity of <inline-formula><math display="inline" xmlns="http://www.w3.org/1998/Math/MathML"><semantics><mi mathvariant="script">D</mi></semantics></math></inline-formula> can be exceeded even when the programs are executed on some signifiable discretely finite real numbers in the domains of these functions.…”
    Get full text
    Article
  17. 257
  18. 258

    A Computer Package for Computing the Confidence Limits of a Measured Factor by Saad Haj Bakry, Mustafa Shatilla

    Published 1990-01-01
    “…The algorithm is simple to program in any computer language, and it saves its users from having to resort to using statistical tables. …”
    Get full text
    Article
  19. 259

    Fairness-Aware Computation Offloading for Mobile Edge Computing With Energy Harvesting by Dedi Triyanto, I. Wayan Mustika, Widyawan, Praphan Pavarangkoon

    Published 2025-01-01
    “…Mobile edge computing (MEC) improves network performance by minimizing latency and assigning computing tasks to edge servers. …”
    Get full text
    Article
  20. 260