Results 41 to 50 of about 973,180 (337)

Computational intelligence and soft computing: some thoughts on already explored and not yet explored paths [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2010
We comment upon the very essence, roots, potentials, and applicability of computational intelligence and soft computing. We followed a different path than those traditionally employed, and which are so well and in a deep and comprehensive way documented ...
Janusz Kacprzyk
doaj   +1 more source

A neural network for shortest path computation [PDF]

open access: yesIEEE Transactions on Neural Networks, 2001
This paper presents a new neural network to solve the shortest path problem for inter-network routing. The proposed solution extends the traditional single-layer recurrent Hopfield architecture introducing a two-layer architecture that automatically guarantees an entire set of constraints held by any valid solution to the shortest path problem.
F. Araújo, B. Ribeiro, L. Rodrigues
openaire   +4 more sources

Enhanced FRER Mechanism in Time-Sensitive Networking for Reliable Edge Computing

open access: yesSensors
Time-Sensitive Networking (TSN) and edge computing are promising networking technologies for the future of the Industrial Internet. TSN provides a reliable and deterministic low-latency communication service for edge computing.
Shaoliu Hu   +3 more
doaj   +1 more source

Computing as a service pattern based on edge computing

open access: yesDianzi Jishu Yingyong, 2019
Edge computing is a computational model for all terminal devices from cloud to edge path, which emerges in the era of interconnection of all things. The existing server pattern under cloud computing model cannot satisfy the application requirements of ...
Wang Tengfei   +5 more
doaj   +1 more source

A Multi-Path Routing Protocol Based on Link Lifetime and Energy Consumption Prediction for Mobile Edge Computing

open access: yesIEEE Access, 2020
During mobile edge computing, due to the movement of nodes and the exhaustion of node energy, link failure occurs thus reducing the network lifetime in the mobile ad-hoc network. When the route fails, because the single-path protocols need to restart the
De-Gan Zhang   +6 more
doaj   +1 more source

Memristive Crossbar Arrays for Storage and Computing Applications

open access: yesAdvanced Intelligent Systems, 2021
The emergence of memristors with potential applications in data storage and artificial intelligence has attracted wide attentions. Memristors are assembled in crossbar arrays with data bits encoded by the resistance of individual cells.
Huihan Li   +10 more
doaj   +1 more source

Iterative Dynamic Critical Path Scheduling: An Efficient Technique for Offloading Task Graphs in Mobile Edge Computing

open access: yesApplied Sciences, 2022
Recent years have witnessed a paradigm shift from centralized cloud computing to decentralized edge computing. As a key enabler technique in edge computing, computation offloading migrates computation-intensive tasks from resource-limited devices to ...
Bo Xu   +5 more
doaj   +1 more source

Explicit Computational Paths

open access: yes, 2016
The treatment of equality as a type in type theory gives rise to an interesting type-theoretic structure known as `identity type'. The idea is that, given terms $a,b$ of a type $A$, one may form the type $Id_{A}(a,b)$, whose elements are proofs that $a$ and $b$ are equal elements of type $A$.
Ramos, Arthur Freitas   +2 more
openaire   +2 more sources

Paths, computations and labels in the λ-calculus

open access: yesTheoretical Computer Science, 1993
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cosimo Laneve, Andrea Asperti
openaire   +3 more sources

Quantum Diagrams and Quantum Networks

open access: yes, 2014
This paper is an introduction to diagrammatic methods for representing quantum processes and quantum computing. We review basic notions for quantum information and quantum computing.
Kauffman, Louis H.   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy