„Computer System Implementation.“
Suchergebnisse
3.234 Treffer
-
FPGA implementation of HOOFR bucketing extractor-based real-time embedded SLAM applications
-
Two-level fuzzy-neural load distribution strategy in cloud-based web system
-
Design and implementation of fuzzy priority deadline job scheduling algorithm in heterogeneous grid computing
-
Low power and high-speed FPGA implementation for 4D memristor chaotic system for image encryption
-
Analytical study of hardware-rooted security standards and their implementation techniques in mobile
-
Approximation analysis of ontology learning algorithm in linear combination setting
-
Circuit implementation of 3D chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality
-
From model to implementation: a network algorithm programming language
-
An efficient task offloading scheme in vehicular edge computing
-
Implementation of Vertex-Fed Multiband Antenna for Wireless Applications with Frequency Band Reconfigurability Characteristics
-
Fast and Accurate Edge Computing Energy Modeling and DVFS Implementation in GEM5 Using System Call Emulation Mode
-
A systematic literature review on hardware implementation of artificial intelligence algorithms
-
Implementation of an Efficient Artificial Bee Colony Algorithm for Node Localization in Unmanned Aerial Vehicle Assisted Wireless Sensor Networks
-
SIES: A Novel Implementation of Spiking Convolutional Neural Network Inference Engine on Field-Programmable Gate Array
-
A comparative analysis of two computer science degree offerings
-
A learning style classification approach based on deep belief network for large-scale online education
-
CNN based lane detection with instance segmentation in edge-cloud computing
-
ALICAT: a customized approach to item selection process in computerized adaptive testing
-
Using cloud computing technology to design and implementation of smart shop floor control system
-
Design and implementation of hybrid integration of cognitive learning and chaotic countermeasures for side channel attacks