Academic literature on the topic 'Computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computing"

1

Henkel, Jorg. "Approximate Computing: Solving Computing's Inefficiency Problem?" IEEE Design & Test 33, no. 1 (February 2016): 4–5. http://dx.doi.org/10.1109/mdat.2015.2509608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Румянцев, К. Е., and Л. К. Хаджиева. "CONFIDENTIAL COMPUTINGIN A PROTECTED COMPUTING ENVIRONMENT." Вестник ГГНТУ. Технические науки, no. 4(30) (December 22, 2022): 31–37. http://dx.doi.org/10.34708/gstou.2022.13.45.004.

Full text
Abstract:
Обеспечение информационной безопасности является немаловажным фактором в настоящее время, особенно это касается вычислительных систем, инфокоммуникационных систем и систем передачи данных. В статье рассмотрена надежность вычислений, изложена концепция вычислений, проведена параллель между физической и логической составляющей защиты информации. Применению больших данных и технологий искусственного интеллекта в наше время уделяется все больше внимания с точки зрения защиты конфиденциальности и адекватного соответствия данных. Методы, которые могут обеспечить безопасность данных и использовать данные для доверенных вычислений в соответствии с требованиями, так называемые конфиденциальные вычисления, привлекают все больше и больше внимания людей. Решение данной проблемы в статье предлагается реализовать с применением технологии TEMPEST, которая применяет экранирование, которое ограничивает утечку электромагнитной информации от внутреннего излучения, предотвращает попадание внешних радиочастотных помех в вычислительные среды. Ensuring information security is no small important factor at present, especially for computing systems, infocommunication systems and data transmission systems. Since electromagnetic leakage not only harms the health of people who are near the computer, but also causes electromagnetic interference in the surrounding electronic equipment and leads to information leakage, this article discusses methods for protecting information and preventing leakage of electromagnetic radiation, analyzes methods for protecting information and their applications. The TEMPEST shielding technology, which includes the mechanism of electromagnetic leakage of information processing equipment, is considered. In addition to electromagnetic information leakage, the article considers the reliability of calculations, outlines the concept of calculations, draws a parallel between the physical and logical components of information protection.
APA, Harvard, Vancouver, ISO, and other styles
3

Sakariya, Harsh Bipinbhai, and Ganesh D. "Taxonomy of Load Balancing Strategies in Distributed Systems." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 03 (March 25, 2024): 1796–802. http://dx.doi.org/10.15680/ijircce.2024.1203070.

Full text
Abstract:
Large-scale parallel and distributed computing systems are becoming more popular as a result of falling hardware prices and improvements in computer networking technologies. Improved performance and resource sharing are potential benefits of distributed computing systems. We have provided a summary of distributed computing in this essay. The differences between parallel and distributed computing, terms related to distributed computing, task distribution in distributed computing, performance metrics in distributed computing systems, parallel distributed algorithm models, benefits of distributed computing, and distributed computing's application domain were all covered in this paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Guo Zhi, and Ning Zhou. "The Development of Computing System with Equivalent Beam Element Based on Matlab Software." Advanced Materials Research 479-481 (February 2012): 1161–64. http://dx.doi.org/10.4028/www.scientific.net/amr.479-481.1161.

Full text
Abstract:
The computing method of series traction mechanism of heavy machinery was studied. The scheme of its computing system with equivalent beam element was proposed. Based on this scheme, combining with secondary development of language of Matlab, the computing system was developed. Through comparing with the reslut of enity element with ANSYS, the computing system was verified. Beacause of the computing system developed, the computating efficiency is improved and the accuracy is ensured.
APA, Harvard, Vancouver, ISO, and other styles
5

Sahare, Shubhangi, and Dr D. V. Rojatkar. "Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 786–89. http://dx.doi.org/10.31142/ijtsrd4685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Eeckhout, Lieven. "Approximate Computing, Intelligent Computing." IEEE Micro 38, no. 4 (July 2018): 6–7. http://dx.doi.org/10.1109/mm.2018.043191119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vachhani, Prof Milan Kantilal, and Dr Kishor H. Atkotiya. "Similarities and Contrast between Grid Computing and Cloud Computing." Indian Journal of Applied Research 3, no. 3 (October 1, 2011): 54–56. http://dx.doi.org/10.15373/2249555x/mar2013/19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yi, and Yi Min Su. "Research on Resource Scheduling Algorithm in Cloud Computing Data Center." Advanced Materials Research 926-930 (May 2014): 2050–53. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2050.

Full text
Abstract:
In recent years, with the rapid development of Internet and virtualization technology, cloud computing, which providing users with on-demand services, has become a research hotspot. Under the environment of cloud computing, the datacenter, consisted by hardware and software, is a loosely coupled resource sharing architecture. The existing cloud computing's inadequacies are as following three aspects: 1. For lacking of real adequate and effective transaction of global bidirectional-way selection, the revenue of most of cloud resource provider is too low. 2. Since not fully considering the scheduling of multi-dimensional cloud resources, existing cloud computing's utilization for multi-dimensional cloud resource is too low. 3. Because existing cloud datacenter does not fully consider the energy consumption of communication between the cloud tasks, its energy consumption is too high. Resource scheduling is a major research direction of cloud computing. First, we make a in-depth investigation and analysis of the research status of cloud computing resource scheduling, and then focus on resource scheduling method to reduce the energy consumption of cloud computing data center. Finally we set an important future research direction of cloud computing resource management research in order to provide a useful reference for cloud computing research.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Yan. "Web Data Mining Technology on Cloud Computing." Applied Mechanics and Materials 543-547 (March 2014): 3490–93. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3490.

Full text
Abstract:
With the rapid development of cloud computing technology, the traditional centralized data mining technology becomes inappropriate for the growing huge amounts of data. Cloud computings Web data mining technology comes into use because it is a reliable and efficient method. This article introduces the meaning, characteristics, and the present situation of cloud computing, analyzes the advantage of Web data mining technology on the basis of the use of cloud computing technology, makes investigations and summaries of the present situation, challenges and problems of the current cloud computing Web data mining technology research, and puts forward the corresponding methods to solve these problems.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhao, Wei, and Hong Tao Zhang. "E-Commerce Recommendation System Based on Cloud Computing." Advanced Materials Research 926-930 (May 2014): 2570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2570.

Full text
Abstract:
According to the Present Situations were that there is an urgent demand for large data analysis in Electronic Commerce, by using cloud computings advantage in storing and analyzing mass data, the solution of new project which can analysis data was proposed, based on the cloud computing. Firstly, aiming to the advantages of the cloud computing platform, the novel data-analysis architecture was designed, then the business flow chart by using cloud computing analysis on the architecture. Finally the project is validated by practical application and possesses certain reference meaning in data exchange based on cloud computing.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computing"

1

Schmidt, Albrecht. "Ubiquitous computing : computing in context." Thesis, Lancaster University, 2003. http://eprints.lancs.ac.uk/12221/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Furrer, Frank J., and Georg Püschel. "From Algorithmic Computing to Autonomic Computing." Technische Universität Dresden, 2018. https://tud.qucosa.de/id/qucosa%3A30773.

Full text
Abstract:
In algorithmic computing, the program follows a predefined set of rules – the algorithm. The analyst/designer of the program analyzes the intended tasks of the program, defines the rules for its expected behaviour and programs the implementation. The creators of algorithmic software must therefore foresee, identify and implement all possible cases for its behaviour in the future application! However, what if the problem is not fully defined? Or the environment is uncertain? What if situations are too complex to be predicted? Or the environment is changing dynamically? In many such cases algorithmic computing fails. In such situations, the software needs an additional degree of freedom: Autonomy! Autonomy allows software to adapt to partially defined problems, to uncertain or dynamically changing environments and to situations that are too complex to be predicted. As more and more applications – such as autonomous cars and planes, adaptive power grid management, survivable networks, and many more – fall into this category, a gradual switch from algorithmic computing to autonomic computing takes place. Autonomic computing has become an important software engineering discipline with a rich literature, an active research community, and a growing number of applications.:Introduction 5 1 A Process Data Based Autonomic Optimization of Energy Efficiency in Manufacturing Processes, Daniel Höschele 9 2 Eine autonome Optimierung der Stabilität von Produktionsprozessen auf Basis von Prozessdaten, Richard Horn 25 3 Assuring Safety in Autonomous Systems, Christian Rose 41 4 MAPE-K in der Praxis - Grundlage für eine mögliche automatische Ressourcenzuweisung, in der Cloud Michael Schneider 59
APA, Harvard, Vancouver, ISO, and other styles
3

Cordone, Luigi. "L’evoluzione del Cloud Computing: Il Serverless Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Il Serverless computing è l’evoluzione delle piattaforme cloud nella direzione di un codice puramente cloud-native. Esso ha l’obiettivo di facilitare il più possibile il lavoro degli sviluppatori evitando loro il compito di gestione e manutenzione delle infrastrutture, fornendo architetture auto-funzionanti che svolgano parte del lavoro per loro e riducendo così i tempi e costi. L’uso di questa tecnologia ha avuto un rapido e deciso aumento negli ultimi due anni, con un tasso di crescita del 700%, e ha le carte in regola per essere uno dei principali approcci di sviluppo in ambito IT del futuro. Il Serverless è un modello di servizio emergente che punta a semplificare l’approccio alla programmazione liberando il programmatore da tutti quegli aspetti che esulano dalla scrittura del codice. In questa tesi si fornisce una panoramica sul Serverless computing e si approfondirà l’ambito di utilizzo di serverless, il suo funzionamento, le tecnologie di cui si serve, come può imporsi nel mercato e per quale motivo dovrebbe poter soppiantare le soluzioni già presenti e già stabilmente radicate in ambito aziendale.
APA, Harvard, Vancouver, ISO, and other styles
4

Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.

Full text
Abstract:
The explosion in growth of smart wireless devices has increased the ubiquitous presence of computational resources and location-based data. This new reality of numerous wireless devices capable of collecting, sharing, and processing information, makes possible an avenue for new enhanced applications. Multiple radio nodes with diverse functionalities can form a wireless cloud computing network (WCCN) and collaborate on executing complex applications using wireless distributed computing (WDC). Such a dynamically composed virtual cloud environment can offer services and resources hosted by individual nodes for consumption by user applications. This dissertation proposes an architectural framework for WCCNs and presents the different phases of its development, namely, development of a mathematical system model of WCCNs, simulation analysis of the performance benefits offered by WCCNs, design of decision-making mechanisms in the architecture, and development of a prototype to validate the proposed architecture. The dissertation presents a system model that captures power consumption, energy consumption, and latency experienced by computational and communication activities in a typical WCCN. In addition, it derives a stochastic model of the response time experienced by a user application when executed in a WCCN. Decision-making and resource allocation play a critical role in the proposed architecture. Two adaptive algorithms are presented, namely, a workload allocation algorithm and a task allocation - scheduling algorithm. The proposed algorithms are analyzed for power efficiency, energy efficiency, and improvement in the execution time of user applications that are achieved by workload distribution. Experimental results gathered from a software-defined radio network prototype of the proposed architecture validate the theoretical analysis and show that it is possible to achieve 80 % improvement in execution time with the help of just three nodes in the network.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Bui, Thai Le Quy. "Using Spammers' Computing Resources for Volunteer Computing." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1629.

Full text
Abstract:
Spammers are continually looking to circumvent counter-measures seeking to slow them down. An immense amount of time and money is currently devoted to hiding spam, but not enough is devoted to effectively preventing it. One approach for preventing spam is to force the spammer's machine to solve a computational problem of varying difficulty before granting access. The idea is that suspicious or problematic requests are given difficult problems to solve while legitimate requests are allowed through with minimal computation. Unfortunately, most systems that employ this model waste the computing resources being used, as they are directed towards solving cryptographic problems that provide no societal benefit. While systems such as reCAPTCHA and FoldIt have allowed users to contribute solutions to useful problems interactively, an analogous solution for non-interactive proof-of-work does not exist. Towards this end, this paper describes MetaCAPTCHA and reBOINC, an infrastructure for supporting useful proof-of-work that is integrated into a web spam throttling service. The infrastructure dynamically issues CAPTCHAs and proof-of-work puzzles while ensuring that malicious users solve challenging puzzles. Additionally, it provides a framework that enables the computational resources of spammers to be redirected towards meaningful research. To validate the efficacy of our approach, prototype implementations based on OpenCV and BOINC are described that demonstrate the ability to harvest spammer's resources for beneficial purposes.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Joo Hong. "Hybrid Parallel Computing Strategies for Scientific Computing Applications." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/28882.

Full text
Abstract:
Multi-core, multi-processor, and Graphics Processing Unit (GPU) computer architectures pose significant challenges with respect to the efficient exploitation of parallelism for large-scale, scientific computing simulations. For example, a simulation of the human tonsil at the cellular level involves the computation of the motion and interaction of millions of cells over extended periods of time. Also, the simulation of Radiative Heat Transfer (RHT) effects by the Photon Monte Carlo (PMC) method is an extremely computationally demanding problem. The PMC method is example of the Monte Carlo simulation method—an approach extensively used in wide of application areas. Although the basic algorithmic framework of these Monte Carlo methods is simple, they can be extremely computationally intensive. Therefore, an efficient parallel realization of these simulations depends on a careful analysis of the nature these problems and the development of an appropriate software framework. The overarching goal of this dissertation is develop and understand what the appropriate parallel programming model should be to exploit these disparate architectures, both from the metric of efficiency, as well as from a software engineering perspective. In this dissertation we examine these issues through a performance study of PathSim2, a software framework for the simulation of large-scale biological systems, using two different parallel architectures’ distributed and shared memory. First, a message-passing implementation of a multiple germinal center simulation by PathSim2 is developed and analyzed for distributed memory architectures. Second, a germinal center simulation is implemented on shared memory architecture with two parallelization strategies based on Pthreads and OpenMP. Finally, we present work targeting a complete hybrid, parallel computing architecture. With this work we develop and analyze a software framework for generic Monte Carlo simulations implemented on multiple, distributed memory nodes consisting of a multi-core architecture with attached GPUs. This simulation framework is divided into two asynchronous parts: (a) a threaded, GPU-accelerated pseudo-random number generator (or producer), and (b) a multi-threaded Monte Carlo application (or consumer). The advantage of this approach is that this software framework can be directly used within any Monte Carlo application code, without requiring application-specific programming of the GPU. We examine this approach through a performance study of the simulation of RHT effects by the PMC method on a hybrid computing architecture. We present a theoretical analysis of our proposed approach, discuss methods to optimize performance based on this analysis, and compare this analysis to experimental results obtained from simulations run on two different hybrid, parallel computing architectures.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Paladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing." Thesis, Security Lab, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.

Full text
Abstract:
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers. One of the consequences of moving data processing and storage off company premises is that organizations have less control over their infrastructure. As a result, cloud service (CS) clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider and can not be remotely verified and validated by an external party. Enabling the CS client to verify the integrity of the host where the virtual machine instance will run, as well as to ensure that the virtual machine image has not been tampered with, are some steps towards building trust in the CS provider. Having the tools to perform such verifications prior to the launch of the VM instance allows the CS clients to decide in runtime whether certain data should be stored- or calculations should be made on the VM instance offered by the CS provider. This thesis combines three components -- trusted computing, virtualization technology and cloud computing platforms -- to address issues of trust and security in public cloud computing environments. Of the three components, virtualization technology has had the longest evolution and is a cornerstone for the realization of cloud computing. Trusted computing is a recent industry initiative that aims to implement the root of trust in a hardware component, the trusted platform module. The initiative has been formalized in a set of specifications and is currently at version 1.2. Cloud computing platforms pool virtualized computing, storage and network resources in order to serve a large number of customers customers that use a multi-tenant multiplexing model to offer on-demand self-service over broad network. Open source cloud computing platforms are, similar to trusted computing, a fairly recent technology in active development. The issue of trust in public cloud environments is addressed by examining the state of the art within cloud computing security and subsequently addressing the issues of establishing trust in the launch of a generic virtual machine in a public cloud environment. As a result, the thesis proposes a trusted launch protocol that allows CS clients to verify and ensure the integrity of the VM instance at launch time, as well as the integrity of the host where the VM instance is launched. The protocol relies on the use of Trusted Platform Module (TPM) for key generation and data protection. The TPM also plays an essential part in the integrity attestation of the VM instance host. Along with a theoretical, platform-agnostic protocol, the thesis also describes a detailed implementation design of the protocol using the OpenStack cloud computing platform. In order the verify the implementability of the proposed protocol, a prototype implementation has built using a distributed deployment of OpenStack. While the protocol covers only the trusted launch procedure using generic virtual machine images, it presents a step aimed to contribute towards the creation of a secure and trusted public cloud computing environment.
TESPEV
CNS
APA, Harvard, Vancouver, ISO, and other styles
8

Doornik, Jurgen A. "Econometric computing." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.282211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Suri, Niranjan. "Agile computing." Thesis, Lancaster University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533102.

Full text
Abstract:
Wirelessly networked dynamic and mobile environments, such as tactical military environments, pose many challenges to building distributed computing systems. A wide variety of node types and resources, unreliable and bandwidth constrained communications links, high chum rates, and rapidly changing user demands and requirements make it difficult to build systems that satisfy the needs of the users and provide good performance. Agile c ._mputing is an innovative metaphor for distributed computing systems and prescribes a new approach to their design and implementation. Agile computing may be defined as opportunistically discovering, manipulating, and exploiting available computing and communication resources. The term agile is used to highlight the desire to both quickly react to changes in the environment as well as to take advantage of transient resources only available for short periods of time. This thesis describes the overall agile computing metaphor as well as one concrete realisation through a middleware infrastructure. An important contribution of the thesis is the definition of a generic architecture for agile computing, which identifies the core and ancillary attributes that contribute to systems that are to be agile. The thesis also describes the design and implementation of one concrete middleware solution, which provides a number of components and capabilities that integrate together to address the challenges of the overall problem. These components include the Aroma virtual machine, the Mockets communications library, the Group Manager resource discovery component, the DisService peer-to-peer information dissemination system, and the AgServe service oriented architecture. The design and development of these components has been motivated by observing problems with real systems in tactical military environments. As a result, the components have been incorporated into real systems and used in the field. The key contribution of this thesis is the prescribed approach to combining these capabilities in order to build opportunistic systems. The capabilities of these components, both individually, as well as part of a single integrated system, are evaluated through a series of experiments and compared with existing systems and standards. The results show significant performance improvements for each of the components. For example, the Mockets library performs up to 7.6x better than TCP (Transmission Control Protocol) sockets in terms of throughput depending on the type of radio utilised. When exploiting unique features in the Mockets library, such as message replacement, the Mockets library performs up to 44x better than SCTP (Stream Control Transmission Protocol) and SCPS (Space Communications Protocol Standards) in terms of timeliness of delivery of data. Likewise, when compared to the JXTA middleware from Sun Microsystems, the Group Manager uses up to 4.8x less bandwidth to support service discovery. Finally, experiments to measure the agility of the integrated middleware show that transient resources that are available for as short a period as 10 seconds can be opportunistically exploited. The Agile Computing Middleware, as presented in this thesis, continues to evolve in terms of further optimisations, incorporation of new components, enhancement of the existing components, and test and evaluation in real-world demonstrations and exercises. It is also hoped that the definition of the concept of agile computing and a general architecture for agile computing will encourage other researchers to build new systems that adopt and advance the notions of agile computing.
APA, Harvard, Vancouver, ISO, and other styles
10

Kashani-Poor, Amir-Kian. "Computing Z_top." Habilitation à diriger des recherches, Ecole Normale Supérieure de Paris - ENS Paris, 2014. http://tel.archives-ouvertes.fr/tel-01056403.

Full text
Abstract:
La corde topologique établit un contexte dans lequel beaucoup de caractéristiques de la théorie des cordes complète, comme les aspects complémentaires de la description par la surface d'univers et l'espace cible, ou la dualité entre corde ouverte et corde fermée, mènent à des techniques de calcul qui vont au-delà de la théorie perturbative. Ce mémoire résume mes activités de recherche dans ce domaine. La présentation est organisée autour des calculs de la fonction de partition de la corde topologique Z_top basés sur des perspectives diverses sur la corde topologique.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computing"

1

Long, Larry. Computing. Englewood Cliffs: Prentice-Hall International, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fanning, Gerry. Computing. Deddington, Oxfordshire: Philip Allan Publishers Ltd, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nick, Waites, ed. Computing. 3rd ed. Sunderland: Business Education Pubs., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1934-, Coffman E. G., Lenstra J. K, and Rinnooy Kan, A. H. G., 1949-, eds. Computing. Amsterdam: North-Holland, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quality Assurance Agency for Higher Education. Computing. Gloucester: Quality Assurance Agency for Higher Education, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nancy, Long, ed. Computing. Englewood Cliffs, N.J: Prentice Hall, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Păun, Gheorghe. DNA Computing: New Computing Paradigms. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grzegorz, Rozenberg, and Salomaa Arto, eds. DNA computing: New computing paradigms. Berlin: Springer, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

W, Ryan Hugh, ed. Netcentric computing: Computing, communications, and knowledge. Boca Raton, FL: Auerbach, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Authority, Scottish Qualifications, ed. Higher computing. Edinburgh: Leckie & Leckie, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computing"

1

Cheng, Xiang, Luoyang Fang, Liuqing Yang, and Shuguang Cui. "Computing." In Wireless Networks, 35–49. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96116-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hämmerlin, Günther, and Karl-Heinz Hoffman. "Computing." In Numerical Mathematics, 1–46. New York, NY: Springer New York, 1991. http://dx.doi.org/10.1007/978-1-4612-4442-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Digby, P. G. N., and R. A. Kempton. "Computing." In Multivariate Analysis of Ecological Communities, 176–86. Dordrecht: Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3133-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Digby, P. G. N., and R. A. Kempton. "Computing." In Multivariate Analysis of Ecological Communities, 176–86. Dordrecht: Springer Netherlands, 1987. http://dx.doi.org/10.1007/978-94-009-3135-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eftelioglu, Emre, and Shashi Shekhar. "Computing." In The Food-Energy-Water Nexus, 429–57. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29914-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Galloway, John, and Sally Paveley. "Computing." In Technology for SEND in Primary Schools: A Guide for Best Practice, 98–118. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: Learning Matters, 2017. http://dx.doi.org/10.4135/9781529714470.n8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Burkholder, Leslie. "Computing." In A Companion to the Philosophy of Science, 44–52. Oxford, UK: Blackwell Publishers Ltd, 2017. http://dx.doi.org/10.1002/9781405164481.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Yan. "Introduction." In Simula SpringerBriefs on Computing, 1–8. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83944-4_1.

Full text
Abstract:
AbstractThis chapter first introduces the fundamental concepts of mobile cloud computing. The differences between mobile edge computing and mobile cloud computing are then discussed in detail. The European Telecommunications Standards Institute’s concept of mobile edge computing is introduced with respect to mobile edge computing’s definition, architecture, advantages, and potential applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Xiaoming, Bingying Song, Yingzi Ni, Yifan Ren, and Rui Li. "Cloud Computing—From Offline Computing to Cloud Computing." In Business Trends in the Digital Era, 23–42. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1079-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mauthe, Andreas, and Oliver Heckmann. "13. Distributed Computing – GRID Computing." In Peer-to-Peer Systems and Applications, 193–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11530657_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computing"

1

"Title Page i." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Title Page iii." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pan, Zhigeng, Ruiying Jiang, Gengdai Liu, and Cailiang Shen. "Animating and Interacting with Ancient Chinese Painting - Qingming Festival by the Riverside." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mc Breen, John, Gennaro Di Tosto, Frank Dignum, and Gert Jan Hofstede. "Linking Norms and Culture." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Briot, Jean-Pierre, Marta de Azevedo Irving, Gustavo Mendes de Melo, Jose Eurico Filho Vasconcelos, Isabelle Alvarez, Sophie Martin, and Wei Wei. "A Serious Game and Artificial Agents to Support Intercultural Participatory Management of Protected Areas for Biodiversity Conservation and Social Inclusion." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gluckstad, Fumiko Kano. "Alignment of Remote Cultures: In Contrast to the Relevance Theory of Communication." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kenderdine, Sarah, Lew Lancaster, Howie Lan, and Tobias Gremmler. "Omnidirectional 3D Visualization for the Analysis of a Large-Scale Corpus: Tripitaka Koreana." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kerlow, Isaac. "Earth Girl Saves the Day: A Computer Game Prototype about Earth Hazards." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Min, Mawo Kamakura, Bo Zheng, Jun Takamatsu, Ko Nishino, and Katsushi Ikeuchi. "Clustering Bayon Face Towers Using Restored 3D Shape Models." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Su´rez, Juan-Luis, Fernando Sancho Caparrini, and Javier de la Rosa Perez. "The Art-Space of a Global Community: The Network of Baroque Paintings in Hispanic-America." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computing"

1

Aggour, Kareem S., Robert M. Mattheyses, Joseph Shultz, Brent H. Allen, and Michael Lapinski. Quantum Computing and High Performance Computing. Fort Belvoir, VA: Defense Technical Information Center, December 2006. http://dx.doi.org/10.21236/ada462065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bui, Thai. Using Spammers' Computing Resources for Volunteer Computing. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.1628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sexton-Kennedy, Elizabeth S., and James Amundson. Quantum Computing. Office of Scientific and Technical Information (OSTI), January 2019. http://dx.doi.org/10.2172/1477986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pakin, Scott D. Quantum Computing. Office of Scientific and Technical Information (OSTI), December 2017. http://dx.doi.org/10.2172/1415361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schellman, Heidi. DUNE computing. Office of Scientific and Technical Information (OSTI), November 2019. http://dx.doi.org/10.2172/1630709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lewis, Nate, and Peter Weinberger. DNA Computing. Fort Belvoir, VA: Defense Technical Information Center, October 1995. http://dx.doi.org/10.21236/ada301695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yajima, Hiroyoshi. Optical Computing. Fort Belvoir, VA: Defense Technical Information Center, August 1993. http://dx.doi.org/10.21236/ada267881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hotaling, Steven P. Quantum Computing. Fort Belvoir, VA: Defense Technical Information Center, April 1998. http://dx.doi.org/10.21236/ada345672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Frasch, Wayne D. DNA Computing. Fort Belvoir, VA: Defense Technical Information Center, March 2008. http://dx.doi.org/10.21236/ada480858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Favorite, Jeffrey. Scientific Computing. Office of Scientific and Technical Information (OSTI), June 2024. http://dx.doi.org/10.2172/2372661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography