Results 41 to 50 of about 1,024,245 (290)

Separation of Variables and the Computation of Fourier Transforms on Finite Groups, II [PDF]

open access: yes, 2015
We present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite group.
Maslen, David   +2 more
core   +3 more sources

Enhanced FRER Mechanism in Time-Sensitive Networking for Reliable Edge Computing

open access: yesSensors
Time-Sensitive Networking (TSN) and edge computing are promising networking technologies for the future of the Industrial Internet. TSN provides a reliable and deterministic low-latency communication service for edge computing.
Shaoliu Hu   +3 more
doaj   +1 more source

Computing as a service pattern based on edge computing

open access: yesDianzi Jishu Yingyong, 2019
Edge computing is a computational model for all terminal devices from cloud to edge path, which emerges in the era of interconnection of all things. The existing server pattern under cloud computing model cannot satisfy the application requirements of ...
Wang Tengfei   +5 more
doaj   +1 more source

Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum

open access: yesInformation, 2021
The current IT market is more and more dominated by the “cloud continuum”. In the “traditional” cloud, computing resources are typically homogeneous in order to facilitate economies of scale.
Juncal Alonso   +6 more
doaj   +1 more source

Quantum Diagrams and Quantum Networks

open access: yes, 2014
This paper is an introduction to diagrammatic methods for representing quantum processes and quantum computing. We review basic notions for quantum information and quantum computing.
Kauffman, Louis H.   +1 more
core   +1 more source

Spatiotemporal Barcodes for Image Sequence Analysis [PDF]

open access: yes, 2015
Taking as input a time-varying sequence of two-dimensional (2D) binary images, we develop an algorithm for computing a spatiotemporal 0–barcode encoding lifetime of connected components on the image sequence over time.
González Díaz, Rocío   +2 more
core   +1 more source

Computational intelligence and soft computing: some thoughts on already explored and not yet explored paths [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2010
We comment upon the very essence, roots, potentials, and applicability of computational intelligence and soft computing. We followed a different path than those traditionally employed, and which are so well and in a deep and comprehensive way documented ...
Janusz Kacprzyk
doaj   +1 more source

Why does malaria transmission continue at high levels despite universal vector control? Quantifying persistent malaria transmission by Anopheles funestus in Western Province, Zambia

open access: yesParasites & Vectors
Background Some settings continue to experience a high malaria burden despite scale-up of malaria vector control to high levels of coverage. Characterisation of persistent malaria transmission in the presence of standard control measures, also termed ...
Ruth A. Ashton   +23 more
doaj   +1 more source

A methionine‐lined active site governs carbocation stabilization and product specificity in a bacterial terpene synthase

open access: yesFEBS Letters, EarlyView.
This study reveals a unique active site enriched in methionine residues and demonstrates that these residues play a critical role by stabilizing carbocation intermediates through novel sulfur–cation interactions. Structure‐guided mutagenesis further revealed variants with significantly altered product profiles, enhancing pseudopterosin formation. These
Marion Ringel   +13 more
wiley   +1 more source

Iterative Dynamic Critical Path Scheduling: An Efficient Technique for Offloading Task Graphs in Mobile Edge Computing

open access: yesApplied Sciences, 2022
Recent years have witnessed a paradigm shift from centralized cloud computing to decentralized edge computing. As a key enabler technique in edge computing, computation offloading migrates computation-intensive tasks from resource-limited devices to ...
Bo Xu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy