Results 11 to 20 of about 1,164,549 (348)

Circuitry selectively limits data storage in general purpose computer [PDF]

open access: green, 1969
Circuitry limits storage in the memory of a stored program general purpose digital computer by permitting storage or writing to certain, specified areas of memory.
D. K. Slopper
openalex   +2 more sources

DBSCAN Optimization Algorithm Based on KD-tree Partitioning in Cloud Computing [PDF]

open access: yesJisuanji gongcheng, 2017
The parallel RDD-DBSCAN algorithm has a repeated access to the data set in the data partition and region query steps,which reduces the efficiency of the algorithm.Aiming at the above problems,a parallel DBSCAN algorithm based on data partitioning and ...
CHEN Guangsheng,CHENG Yiqun,JING Weipeng
doaj   +1 more source

QoS Scheduling Algorithm in Cloud Computing Based on Discrete Particle Swarm Optimization [PDF]

open access: yesJisuanji gongcheng, 2017
In order to meet the varied Quality of Service(QoS) requirements of user tasks under cloud computing environment,taking into account of task deadline,scheduling budget and reliability,this paper proposes a task scheduling algorithm with multi-QoS ...
WANG Yue,LIU Yaqiu,GUO Jifeng,JING Weipeng
doaj   +1 more source

Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

open access: yes, 2020
With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users.
da Rocha, Marciano   +5 more
core   +1 more source

Web infrastructure for data management, storage and computation

open access: yesMedical Imaging 2021: Biomedical Applications in Molecular, Structural, and Functional Imaging, 2021
The Data Storage for Computation and Integration (DSCI) proposes management innovations for web-based secure data storage, algorithms deployment, and task execution. Its architecture allows inclusion of plugins for upload, browsing, sharing, and task execution in remote computing grids. Here, we demonstrate the DSCI implementation and the deployment of
Serge, Brosset   +17 more
openaire   +3 more sources

On short-term traffic flow forecasting and its reliability [PDF]

open access: yes, 2016
Recent advances in time series, where deterministic and stochastic modelings as well as the storage and analysis of big data are useless, permit a new approach to short-term traffic flow forecasting and to its reliability, i.e., to the traffic volatility.
Abouaïssa, Hassane   +2 more
core   +4 more sources

Deep Learning Enables Accurate Prediction of Interplay Between lncRNA and Disease

open access: yesFrontiers in Genetics, 2019
Many studies have suggested that lncRNAs are involved in distinct and diverse biological processes. The mutation of lncRNAs plays a major role in a wide range of diseases.
Jialu Hu   +6 more
doaj   +1 more source

Scalable Storage for Data-Intensive Computing [PDF]

open access: yes, 2011
Persistent storage is a fundamental abstraction in computing. It consists of a named set of data items that come into existence through explicit creation, persist through temporary failures of the system, until they are explicitly deleted. Sharing of data in distributed systems has become pervasive as these systems have grown in scale in terms of ...
Abhishek Verma   +3 more
openaire   +1 more source

Ultracompact TM-Pass Silicon Nanophotonic Waveguide Polarizer and Design

open access: yesIEEE Photonics Journal, 2010
An ultracompact transverse magnetic (TM)-pass polarizer based on silicon nanophotonic waveguides is proposed, which contains two tapered waveguides sandwiching a narrow waveguide section only supporting TM-mode propagation.
Qian Wang, Seng-Tiong Ho
doaj   +1 more source

An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud

open access: yesApplied Sciences, 2023
In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be applied in this case.
Nawaf Alharbe   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy