Results 21 to 30 of about 1,075,529 (290)

Resonant transfer of excitons and quantum computation [PDF]

open access: yesPhysics Letters A, 2003
4 pages, 4 separate figures, REVTeX 4 ...
Lovett, Brendon W.   +4 more
openaire   +4 more sources

DM-MQTT: An Efficient MQTT Based on SDN Multicast for Massive IoT Communications

open access: yesSensors, 2018
Edge computing is proposed to solve the problem of centralized cloud computing caused by a large number of IoT (Internet of Things) devices. The IoT protocols need to be modified according to the edge computing paradigm, where the edge computing devices ...
Jun-Hong Park   +2 more
doaj   +1 more source

Experimental Perfect Quantum State Transfer [PDF]

open access: yes, 2016
The transfer of data is a fundamental task in information systems. Microprocessors contain dedicated data buses that transmit bits across different locations and implement sophisticated routing protocols.
Chapman, Robert J.   +7 more
core   +2 more sources

Method of Joint Optimization for Multi-UAV Energy Transfer and Edge Computing Based on Deep Reinforcement Learning [PDF]

open access: yesJisuanji gongcheng
Due to limited on-board resources and endurance, UAVs have limited residence time in the air and cannot perform computation-intensive tasks continuously.
LIN Shaofu, CHEN Yingying, LI Shuopeng
doaj   +1 more source

Experiences of Computer Science Transfer Students [PDF]

open access: yesProceedings of the 2018 ACM Conference on International Computing Education Research, 2018
About half of recent computer and information science graduates attended community college at some point. Prior work on transfer students in general suggests that the transfer process can engage people from underrepresented communities, but can also be academically and socially "shocking".
Harrison Kwik, Benjamin Xie, Amy J. Ko
openaire   +1 more source

Towards Compute-Optimal Transfer Learning

open access: yesCoRR, 2023
The field of transfer learning is undergoing a significant shift with the introduction of large pretrained models which have demonstrated strong adaptability to a variety of downstream tasks. However, the high computational and memory requirements to finetune or use these models can be a hindrance to their widespread use.
Massimo Caccia   +8 more
openaire   +2 more sources

Privacy and Cloud Computing in Public Schools [PDF]

open access: yes, 2013
Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take ...
Reidenberg, Joel   +5 more
core   +4 more sources

Oblivious Transfer with Constant Computational Overhead

open access: yes, 2023
The computational overhead of a cryptographic task is the asymptotic ratio between the computational cost of securely realizing the task and that of realizing the task with no security at all. Ishai, Kushilevitz, Ostrovsky, and Sahai (STOC 2008) showed that secure two-party computation of Boolean circuits can be realized with constant computational ...
Boyle, Elette   +6 more
openaire   +6 more sources

New method for generating linear transfer matrices through combined rf and solenoid fields

open access: yesPhysical Review Special Topics. Accelerators and Beams, 2012
We present a new method for computing the transverse transfer matrix for superimposed axisymmetric rf and solenoid field maps. The algorithm constructs the transfer matrix directly from one-dimensional rf and solenoid field maps without computing ...
Colwyn Gulliford, Ivan Bazarov
doaj   +1 more source

Computing Masses from Effective Transfer Matrices

open access: yes, 1993
We study the use of effective transfer matrices for the numerical computation of masses (or correlation lengths) in lattice spin models. The effective transfer matrix has a strongly reduced number of components.
A. S. Kronfeld   +29 more
core   +1 more source

Home - About - Disclaimer - Privacy