Results 41 to 50 of about 1,003,319 (338)
The current IT market is more and more dominated by the “cloud continuum”. In the “traditional” cloud, computing resources are typically homogeneous in order to facilitate economies of scale.
Juncal Alonso +6 more
doaj +1 more source
Energy estimators for random series path-integral methods [PDF]
We perform a thorough analysis on the choice of estimators for random series path integral methods. In particular, we show that both the thermodynamic (T-method) and the direct (H-method) energy estimators have finite variances and are straightforward to
Doll, J. D. +3 more
core +4 more sources
Computational Paths and the Fundamental Groupoid of a Type
Using computational paths as the fundamental concept, we show that we can leverage Category Theory to propose the concept of fundamental groupoid of a type.
Ramos, Arthur F. +2 more
openaire +3 more sources
Enhanced FRER Mechanism in Time-Sensitive Networking for Reliable Edge Computing
Time-Sensitive Networking (TSN) and edge computing are promising networking technologies for the future of the Industrial Internet. TSN provides a reliable and deterministic low-latency communication service for edge computing.
Shaoliu Hu +3 more
doaj +1 more source
Computing as a service pattern based on edge computing
Edge computing is a computational model for all terminal devices from cloud to edge path, which emerges in the era of interconnection of all things. The existing server pattern under cloud computing model cannot satisfy the application requirements of ...
Wang Tengfei +5 more
doaj +1 more source
Quantum Diagrams and Quantum Networks
This paper is an introduction to diagrammatic methods for representing quantum processes and quantum computing. We review basic notions for quantum information and quantum computing.
Kauffman, Louis H. +1 more
core +1 more source
Computational intelligence and soft computing: some thoughts on already explored and not yet explored paths [PDF]
We comment upon the very essence, roots, potentials, and applicability of computational intelligence and soft computing. We followed a different path than those traditionally employed, and which are so well and in a deep and comprehensive way documented ...
Janusz Kacprzyk
doaj +1 more source
Separation of Variables and the Computation of Fourier Transforms on Finite Groups, II [PDF]
We present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite group.
Maslen, David +2 more
core +3 more sources
Background Some settings continue to experience a high malaria burden despite scale-up of malaria vector control to high levels of coverage. Characterisation of persistent malaria transmission in the presence of standard control measures, also termed ...
Ruth A. Ashton +23 more
doaj +1 more source
During mobile edge computing, due to the movement of nodes and the exhaustion of node energy, link failure occurs thus reducing the network lifetime in the mobile ad-hoc network. When the route fails, because the single-path protocols need to restart the
De-Gan Zhang +6 more
doaj +1 more source

