Quick search
Advanced search in
Field to searchTerm
Add rule
Filters (1)
Download Results
6,165 research outcomes, page 1 of 617
  • publication . Article . 2020
    Closed Access
    Authors:
    Massimiliano Albanese; Alessandra De Benedictis; Douglas Dyllon Jeronimo de Macedo; Fabrizio Messina;
    Persistent Identifiers
    Publisher: Elsevier BV

    Abstract Cloud technologies are currently experiencing a remarkable degree of pervasiveness in most of the applications and services that are consumed daily by both individual users and companies. The sheer volume of sensitive data and operations that are regularly outs...

    Add to ORCIDorcid
  • publication . Article . 2016
    Closed Access
    Authors:
    Christian D’Orazio; Kim-Kwang Raymond Choo;
    Persistent Identifiers
    Publisher: Elsevier BV

    Mobile devices and apps such as cloud apps are a potential attack vector in an advanced persistent threat (APT) incident, due to their capability to store sensitive data (e.g. backup of private and personal data in digital repositories) and access sensitive resources (e...

    Add to ORCIDorcid
  • publication . Article . 2016
    Closed Access
    Authors:
    Janez Kranjc; Roman Orač; Vid Podpečan; Nada Lavrač; Marko Robnik-Šikonja;
    Persistent Identifiers
    Project: EC | HBP SGA1 (720270)

    Abstract The paper presents a platform for distributed computing, developed using the latest software technologies and computing paradigms to enable big data mining. The platform, called ClowdFlows, is implemented as a cloud-based web application with a graphical user i...

    Add to ORCIDorcid
  • publication . Article . 2002
    Closed Access
    Authors:
    François Coron; Philippe Homsi;
    Persistent Identifiers
    Publisher: Elsevier BV

    Abstract The implementation on a Connection Machine (CM2) of a Monte Carlo method for rarefied gas flow simulation is presented. The physical model and the algorithm are described. Because of the architecture of the CM2, the association between processors and data is ve...

    Add to ORCIDorcid
  • publication . Article . 2002
    Closed Access
    Authors:
    V. Garg; D.E. Schimmel;
    Persistent Identifiers
    Publisher: Elsevier BV

    This paper considers hardware support for the exploitation of control parallelism on data parallel architectures. It is well known that data parallel algorithms may also possess control parallel structure. However the splitting of control leads to data dependency and sy...

    Add to ORCIDorcid
  • publication . Article . 2003
    Closed Access
    Authors:
    Richard Hughes-Jones; Steve Parsley; Ralph Spencer;
    Persistent Identifiers
    Publisher: Elsevier BV

    Recent developments in Very Long Baseline Interferometry (VLBI) radio astronomy are aimed at improving reliability and reducing the cost of operations by moving from a custom made tape based system for using exchangeable disks in PCs. The advent of the iGRID2002 exhibit...

    Add to ORCIDorcid
  • publication . Article . 2017
    Closed Access
    Authors:
    Weifeng Pan; Beibei Song; Kangshun Li; Kejun Zhang;
    Persistent Identifiers
    Publisher: Elsevier BV

    Identifying key classes can help developers familiarize with a previously unknown software system. Complex network research opens new opportunities for identifying key classes, and many approaches have been proposed. However, the software network that existing approache...

    Add to ORCIDorcid
  • publication . Article . 2018
    Closed Access
    Authors:
    Fanyu Bu; Xin Wang; Bo Gao;
    Persistent Identifiers
    Publisher: Elsevier BV

    Abstract The double-projection deep computation model (DPDCM) proved to be effective for big data feature learning. However, DPDCM cannot capture the underlying correlations over the different modalities enough since it projects the input data into only two subspaces. T...

    Add to ORCIDorcid
  • publication . Article . 2019
    Closed Access
    Authors:
    C Shilaja; T Arunprasath;
    Persistent Identifiers
    Publisher: Elsevier BV

    Abstract In hybrid renewable energy system, optimization and control are more complex and non-linearity in nature. This research presented a hybrid algorithm based on Enhance grey wolf optimization and algorithm of Dragonfly algorithm for handling OPF (optimal power flo...

    Add to ORCIDorcid
  • publication . Article . 2020
    Closed Access
    Authors:
    Maytal Dahan; Rebecca Pirzl; Sandra Gesing;
    Persistent Identifiers
    Publisher: Elsevier BV

    Abstract The concept behind Science Gateways (SGs), Virtual Laboratories (VLs)and Virtual Research Environments (VREs) is to support researchers and educators with computational solutions that ease the use of complex research infrastructures, data infrastructures, lab i...

    Add to ORCIDorcid
6,165 research outcomes, page 1 of 617