Results 11 to 20 of about 3,158,311 (225)
Cloud computing has become widely adopted by businesses for hosting applications with improved performance at a fraction of the operational costs and complexity.
Seongmo An +4 more
doaj +2 more sources
A four parameter hardening model for TWIP and TRIP steels
The mechanical behavior of twinning- and transformation-induced plasticity steels, commonly referred to as TWIP and TRIP steels, are characterized by linear hardening followed by an abrupt decrease in the hardening rate.
J.T. Lloyd, D.M. Field, K.R. Limmer
doaj +2 more sources
Docker container hardening method based on trusted computing
Abstract In view of the incomplete isolation of docker, the image file is easy to be tampered with, and the problem of insecure container operation. Based on the analysis of the existing isolation mechanism and security enhancement technology of docker container, this article uses trusted computing technologies such as cryptographic ...
Yuang Shen, Xuejun Yu
openaire +2 more sources
Computed tomographic beam-hardening artefacts: mathematical characterization and analysis [PDF]
This paper presents a mathematical characterization and analysis of beam-hardening artefacts in X-ray computed tomography (CT). In the field of dental and medical radiography, metal artefact reduction in CT is becoming increasingly important as artificial prostheses and metallic implants become more widespread in ageing populations. Metal artefacts are
Hyoung Suk, Park +2 more
openaire +5 more sources
Hardening functions for large scale distributed computations
The past few years have seen the development of distributed computing platforms designed to utilize the spare processor cycles of a large number of personal computers attached to the Internet in an effort to generate levels of computing power normally achieved only with expensive supercomputers.
D. Szajda, B. Lawson, J. Owen
openaire +2 more sources
CHORS: hardening high-assurance security systems with trusted computing [PDF]
High-assurance security systems require strong isolation from the untrusted world to protect the security-sensitive or privacy-sensitive data they process.
W. Ożga +5 more
semanticscholar +1 more source
Hybrid Modular Redundancy: Exploring Modular Redundancy Approaches in RISC-V Multi-core Computing Clusters for Reliable Processing in Space [PDF]
Space Cyber-Physical Systems such as spacecraft and satellites strongly rely on the reliability of onboard computers to guarantee the success of their missions.
M. Rogenmoser +4 more
semanticscholar +1 more source
LHC Computing – the First 3 Decades [PDF]
Computing for the Large Hadron Collider (LHC) at CERN arguably started shortly after the commencement of data taking at the previous machine – LEP – some would argue it was even before.
Sheirs Jamie
doaj +1 more source
Numerical solution of the thermal problem for electric heating of concrete structures in winter [PDF]
This paper presents the results of a numerical solution of the thermal problem for electrical heating of a monolithic reinforced concrete raft foundation in the ELCUT Pro software and computing system.
Gnyrya Aleksei +2 more
doaj +1 more source
Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual ...
Huseyn Huseynov +2 more
doaj +1 more source

