Results 1 to 10 of about 2,400,902 (294)
Verification of the computing process of the corporate information system
Objective. The article discusses the issue of verifying the computing process of a corporate information system. The purpose of the article is to verify the computing process of a corporate information system. Method.
V. I. Polyakov, F. F. Zinnatulin
doaj +1 more source
We consider the problem of computing the Fourier transform of high-dimensional vectors, distributedly over a cluster of machines consisting of a master node and multiple worker nodes, where the worker nodes can only store and process a fraction of the ...
Avestimehr, A. Salman +2 more
core +1 more source
Enabling stream processing for people-centric IoT based on the fog computing paradigm [PDF]
The world of machine-to-machine (M2M) communication is gradually moving from vertical single purpose solutions to multi-purpose and collaborative applications interacting across industry verticals, organizations and people - A world of Internet of Things
Akrivopoulos, Orestis +3 more
core +1 more source
Workpiece Alignment for Hybrid Laser Aided Part Repair Process [PDF]
Work piece alignment is a key issue for hybrid laser aided part repair, a process utilizing both machining and laser deposition. Proper alignment can greatly improve the accuracy of the repair process.
Liou, Frank +2 more
core +2 more sources
Acceleration computing process in wavelength scanning interferometry [PDF]
The optical interferometry has been widely explored for surface measurement due to the advantages of non-contact and high accuracy interrogation. Eventually, some interferometers are used to measure both rough and smooth surfaces such as white light ...
Gao, F. +2 more
core
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data
During the last decade various algorithms have been developed and proposed for discovering overlapping clusters in high-dimensional data. The two most prominent application fields in this research, proposed independently, are frequent itemset mining ...
András Király +2 more
doaj +1 more source
Due to the external disturbances, model uncertainties, strong coupling, and occurred faults, the winding machine presents a great control challenge. In order to deal with these problems, this paper presents the formulation of a novel scheme of fault ...
Haouari Fouad +4 more
doaj +1 more source
Efficient implicit simulation for incremental forming [PDF]
Single Point Incremental Forming (SPIF) is a displacement controlled process performed on a CNC machine. A clamped blank is deformed by the movement of a small sized tool that follows a prescribed tool path.
Boogaard, A.H. van den, Hadoush, A.
core +1 more source
Exploiting Non-Causal CPU-State Information for Energy-Efficient Mobile Cooperative Computing
Scavenging the idling computation resources at the enormous number of mobile devices can provide a powerful platform for local mobile cloud computing. The vision can be realized by peer-to-peer cooperative computing between edge devices, referred to as ...
Brown, André EX +11 more
core +5 more sources

