Zobrazeno 1 - 10
of 3 093
pro vyhledávání: '"symmetric multiprocessor"'
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8892 (2024)
In this study, we investigate the underlying causes of drift in the time history curves of measured parameters obtained through strain electrical measurements and assess their impacts on load measurements. To address the challenge of efficiently proc
Externí odkaz:
https://doaj.org/article/79d5466e97aa45a992c66f3a18cf9071
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Services Computing. 15:2261-2274
Federated Learning (FL) serves privacy-preserving collaborative learning among multiple isolated parties, while retaining their privacy data locally. Cross-device and cross-silo FL have achieved great success in cross-domain applications, in which th
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2304-2317
With the rapid advances in computing and information technologies, traditional access control models have become inadequate in terms of capturing fine-grained, and expressive security requirements of newly emerging applications. An attribute-based ac
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 33:1303-1320
Taskflow aims to streamline the building of parallel and heterogeneous applications using a lightweight task graph-based approach. Taskflow introduces an expressive task graph programming model to assist developers in the implementation of parallel a
Publikováno v:
IEEE Internet of Things Journal. 9:5920-5931
The customization of edge computing services is one of the key research fields in 6G heterogeneous vehicular networks (HetVNETs). With various personalized requirements of vehicles on computation-intensive applications, how to explore the heterogeneo
Publikováno v:
IEEE Transactions on Cloud Computing. 10:1215-1232
In vehicle ad hoc networks (VANETs), if a legal vehicle node becomes malicious, then it is more likely to tamper with transferred data or provide false data easily. Because the malicious node is a valid internal user in VANETs, its behaviour is diffi
Publikováno v:
Future Generation Computer Systems. 127:208-224
Optimization problems are becoming increasingly difficult challenges as a result of the definition of more realistic formulations and the availability of larger input data. Fortunately, the computing capabilities of state-of-the-art heterogeneous sys
Publikováno v:
IEEE Transactions on Computational Social Systems. 9:252-266
Convolutional neural networks (CNNs) have become the critical technology to realize face detection and face recognition in the face tracking (FT) system. However, traditional CNNs usually have nontrivial computational time and high energy consumption
Publikováno v:
Journal of Parallel and Distributed Computing. 160:39-48