Results 251 to 260 of about 160,167 (287)
Some of the next articles are maybe not open access.
New Electronics, 2019
Data is the key to any business and Intertrust's suite of computing products looks to better manage and understand it, as CEO Talal Shamoon explains to New Electronics
openaire +1 more source
Data is the key to any business and Intertrust's suite of computing products looks to better manage and understand it, as CEO Talal Shamoon explains to New Electronics
openaire +1 more source
2018
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire +1 more source
Relying on computer simulations and trusting their results is key for the epistemic future of this new research methodology. The questions that interest us in this chapter are how do researchers typically build reliability on computer simulations? and what exactly would it mean to trust results of computer simulations?
openaire +1 more source
Resource Scheduling in Edge Computing: A Survey
IEEE Communications Surveys and Tutorials, 2021Quyuan Luo, Shihong Hu, Changle Li
exaly
2019
This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points ...
openaire +1 more source
This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points ...
openaire +1 more source
A Survey on In-Network Computing: Programmable Data Plane and Technology Specific Applications
IEEE Communications Surveys and Tutorials, 2023Somayeh Kianpisheh
exaly
2008
Der Mangel an Sicherheit und Verlasslichkeit in den heutigen vernetzten IT-Systemen hat in den letzten 20 Jahren zu immer intensiveren und komplexeren Angriffen auf die Sicherheit der Computer-Infrastruktur gefuhrt. Besonders in der PC-Welt mit ihrer tiefen Vernetzung und dem Einsatz von SW, die auf diese stark zunehmenden Angriffe nicht vorbereitet ...
openaire +1 more source
Der Mangel an Sicherheit und Verlasslichkeit in den heutigen vernetzten IT-Systemen hat in den letzten 20 Jahren zu immer intensiveren und komplexeren Angriffen auf die Sicherheit der Computer-Infrastruktur gefuhrt. Besonders in der PC-Welt mit ihrer tiefen Vernetzung und dem Einsatz von SW, die auf diese stark zunehmenden Angriffe nicht vorbereitet ...
openaire +1 more source
Analogue computing with metamaterials
Nature Reviews Materials, 2020Farzad Zangeneh-Nejad +2 more
exaly
Distributed Artificial Intelligence Empowered by End-Edge-Cloud Computing: A Survey
IEEE Communications Surveys and Tutorials, 2023Sijing Duan, Dan Wang, Ju Ren
exaly

