„Reliable Computing“
Suchergebnisse
1.000+ Treffer
-
Room‐Temperature‐Processable Highly Reliable Resistive Switching Memory with Reconfigurability for Neuromorphic Computing and Ultrasonic Tissue Classification (Adv. Funct. Mater. 14/2023)
-
Artificial Synapses: A Reliable All‐2D Materials Artificial Synapse for High Energy‐Efficient Neuromorphic Computing (Adv. Funct. Mater. 27/2021)
-
Larger and more instructable language models become less reliable
-
Bifurcation analysis, phase portrait, and certain types of solutions to the space-time fractional Sharma-Tasso-Olver equation using reliable methods
-
Multi-constraints reliable multicast routing protocol for group communications in MANETs
-
A hierarchical framework for memory failure prediction in reliable cloud services
-
Data Science and Reliable Machine Learning – Proceedings from the 4th Codassca Workshop Yerevan, Armenia, October 2024
-
Meta-heuristic based reliable and green workflow scheduling in cloud computing
-
Data science and reliable machine learning – proceedings from the 4th Codassca Workshop, Yerevan, Armenia, October 2024
-
A reliable algorithm for solving tenth-order boundary value problems
-
Heterogeneity Unbound: Challenges and Solutions for Next-Generation Networks
-
Reliable Software for Unreliable Hardware - A Cross-Layer Approach
-
Designing High Performance Computing Architectures for Reliable Space Applications
-
Machine learning and high-throughput computation-assisted precise synthesis of quantum dots for reliable neuromorphic computing
-
Trustworthy Global Computing – 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers
-
Distributed Computing – 25th International Symposium, DISC 2011, Rome, Italy, September 20-22, 2011. Proceedings
-
Reliable capacity provisioning for distributed cloud/edge/fog computing applications
-
Computing Highly Reliable Train Journeys
-
A robust, reliable and energy-aware urgent computing framework for ensembles of forecasts
-
Untersuchungen zur Risikominimierungstechnik Stealth Computing für verteilte datenverarbeitende Software-Anwendungen mit nutzerkontrollierbar zusicherbaren Eigenschaften