Showing 141 - 160 results of 6,567 for search 'computing continues', query time: 0.09s Refine Results
  1. 141

    A Generalized HSS Iteration Method for Continuous Sylvester Equations by Xu Li, Yu-Jiang Wu, Ai-Li Yang, Jin-Yun Yuan

    Published 2014-01-01
    “…Moreover, to reduce the computational cost, we establish an inexact variant of the GHSS (IGHSS) iteration method whose convergence property is discussed. …”
    Get full text
    Article
  2. 142
  3. 143

    A Continuous Model for the Dynamical Analysis of Mistuned Bladed Rotors by Paolo Bisegna, Giovanni Caruso

    Published 2012-01-01
    “…Numerical simulations show the effectiveness of the proposed model, requiring much lower computational effort than classical finite element schemes.…”
    Get full text
    Article
  4. 144

    A method for continuously monitoring the quality of Masson pine seedlings. by Li Wang, Zhuo Huang, Handong Gao, Chao Ni

    Published 2021-01-01
    “…Because we can measure the length of root elongation continuously, we can compute the root elongation rate (RER), which is the variety of the length of root elongation per second. …”
    Get full text
    Article
  5. 145

    Semi-Implicit Continuous Newton Method for Power Flow Analysis by Ruizhi Yu, Wei Gu, Yijun Xu, Shuai Lu, Suhan Zhang

    Published 2025-01-01
    “…As an effective emulator of ill-conditioned power flow, continuous Newton methods (CNMs) have been extensively investigated using explicit and implicit numerical integration algorithms. …”
    Get full text
    Article
  6. 146

    Design and test of steam-injected continuous scrambled egg device by Liangyu Xue, Xiaojia Hu, Bo Qi, Yibing Yuan, Wensong Wei, Ping Yang, Xin Ai, Fangting Fu, Chunhui Zhang

    Published 2025-01-01
    “…This study provides technical support for the industrialized continuous production of Chinese egg dishes.…”
    Get full text
    Article
  7. 147

    INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK by Edin Osmanbegović, Nedžad Pirić, Mirza Suljić

    Published 2017-11-01
    “… The purpose of this research is to identify the influence of information security controls on the continuity of information system work. The fact that the companies operate in highly turbulent business environment with severe threats to information security, leads to the need to examine this issue in detail. …”
    Get full text
    Article
  8. 148
  9. 149

    Joint Class and Domain Continual Learning for Decentralized Federated Processes by Chiara Lanza, Tinne Tuytelaars, Marco Miozzo, Eduard Angelats, Paolo Dini

    Published 2025-01-01
    “…So far, learning in IoT scenarios has almost exclusively been studied in a centralized fashion, but CL can be used in decentralized settings involving a multitude of nodes to learn, adapt, and generalize from their streams of data, even with limited communication and computation capabilities. In this work, we formulate a joint Class and Domain Continual Learning problem, where local data at the nodes might include multiple classes belonging to different domains. …”
    Get full text
    Article
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155

    Intrusion Detection System Based on Decision Tree and Clustered Continuous Inputs by Adel Issa

    Published 2011-07-01
    “…With the rapid expansion of computer networks during the past decade, security has become a crucial issue for computer systems. …”
    Get full text
    Article
  16. 156
  17. 157
  18. 158
  19. 159
  20. 160

    Survey on Data Center Network for Cloud Computing by Xuan Luo, Tong Ye, Yaohui Jin

    Published 2014-02-01
    “…Data center network has faced several challenges from the arising of cloud computing.Along with the continuous expansive bandwidth requirements,data center network also should provide network isolation and service guarantee for each tenant.Current researches focued on the physical network,network virtualization and service guarantee were introduced.…”
    Get full text
    Article