Artykuły w czasopismach na temat „Fragmentation (computing)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Fragmentation (computing)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Hudic, Aleksandar, Shareeful Islam, Peter Kieseberg, Sylvi Rennert i Edgar R. Weippl. "Data confidentiality using fragmentation in cloud computing". International Journal of Pervasive Computing and Communications 9, nr 1 (29.03.2013): 37–51. http://dx.doi.org/10.1108/17427371311315743.
Pełny tekst źródłaPark, Y. T., P. Sthapit i J. Y. Pyun. "Energy Efficient Data Fragmentation for Ubiquitous Computing". Computer Journal 57, nr 2 (1.09.2013): 263–72. http://dx.doi.org/10.1093/comjnl/bxt080.
Pełny tekst źródłaRasche, Florian, Aleš Svatoš, Ravi Kumar Maddula, Christoph Böttcher i Sebastian Böcker. "Computing Fragmentation Trees from Tandem Mass Spectrometry Data". Analytical Chemistry 83, nr 4 (15.02.2011): 1243–51. http://dx.doi.org/10.1021/ac101825k.
Pełny tekst źródłaScheubert, Kerstin, Franziska Hufsky, Florian Rasche i Sebastian Böcker. "Computing Fragmentation Trees from Metabolite Multiple Mass Spectrometry Data". Journal of Computational Biology 18, nr 11 (listopad 2011): 1383–97. http://dx.doi.org/10.1089/cmb.2011.0168.
Pełny tekst źródłaBeckham, Olly, Gord Oldman, Julie Karrie i Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption". International research journal of management, IT and social sciences 6, nr 6 (15.10.2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Pełny tekst źródłaRasche, Florian, Aleš Svatoš, Ravi Kumar Maddula, Christoph Böttcher i Sebastian Böcker. "Correction to Computing Fragmentation Trees from Tandem Mass Spectrometry Data". Analytical Chemistry 83, nr 17 (wrzesień 2011): 6911. http://dx.doi.org/10.1021/ac201785d.
Pełny tekst źródłaVivek, V., R. Srinivasan, R. Elijah Blessing i R. Dhanasekaran. "Payload fragmentation framework for high-performance computing in cloud environment". Journal of Supercomputing 75, nr 5 (17.11.2018): 2789–804. http://dx.doi.org/10.1007/s11227-018-2660-7.
Pełny tekst źródłaSalman, Mahdi Abed, Hasanain Ali Al Essa i Khaldoon Alhussayni. "A Distributed Approach for Disk Defragmentation". JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, nr 3 (9.01.2018): 1–5. http://dx.doi.org/10.29196/jub.v26i3.548.
Pełny tekst źródłaPei, Xin, Huiqun Yu i Guisheng Fan. "Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing". International Journal of Software Engineering and Knowledge Engineering 25, nr 09n10 (listopad 2015): 1709–14. http://dx.doi.org/10.1142/s0218194015710047.
Pełny tekst źródłaMariam O. Alrashidi, Mariam O. Alrashidi. "A Framework and Cryptography Algorithm for Protecting Sensitive Data on Cloud Service Providers". journal of King Abdulaziz University Computing and Information Technology Sciences 8, nr 2 (8.03.2019): 69–92. http://dx.doi.org/10.4197/comp.8-2.6.
Pełny tekst źródłaOke, Ayodeji Emmanuel, Ahmed Farouk Kineber, Ibraheem Albukhari, Idris Othman i Chukwuma Kingsley. "Assessment of Cloud Computing Success Factors for Sustainable Construction Industry: The Case of Nigeria". Buildings 11, nr 2 (23.01.2021): 36. http://dx.doi.org/10.3390/buildings11020036.
Pełny tekst źródłaStarodubov, A. N., A. N. Kadochigova i A. V. Kaplun. "Application of the discrete element method for simulation of coal mining by a cutter-loader in a working face". Mining Industry Journal (Gornay Promishlennost), S2/2023 (10.11.2023): 150–54. http://dx.doi.org/10.30686/1609-9192-2023-s2-150-154.
Pełny tekst źródłaCho, Minseon, i Donghyun Kang. "FragTracer: Real-Time Fragmentation Monitoring Tool for F2FS File System". Sensors 23, nr 9 (5.05.2023): 4488. http://dx.doi.org/10.3390/s23094488.
Pełny tekst źródłaChen, Yuan. "The Key Challenges for the Development of a BIM and Mobile Computing Based Collaborative System in the Construction Industry". Applied Mechanics and Materials 197 (wrzesień 2012): 656–60. http://dx.doi.org/10.4028/www.scientific.net/amm.197.656.
Pełny tekst źródłaNajmi, Mahboobeh. "Investigation of Improving Load Balancing and Data Fragmentation in Cloud Computing Performance". Indian Journal of Science and Technology 12, nr 7 (1.02.2019): 1–8. http://dx.doi.org/10.17485/ijst/2019/v12i7/140946.
Pełny tekst źródłaPascariu, Mihai-Cosmin, Nicolae Dinca, Carolina Cojocariu, Eugen Sisu, Alina Serb, Romina Birza i Marius Georgescu. "Computed Mass-Fragmentation Energy Profiles of Some Acetalized Monosaccharides for Identification in Mass Spectrometry". Symmetry 14, nr 5 (23.05.2022): 1074. http://dx.doi.org/10.3390/sym14051074.
Pełny tekst źródłaAbdul Saleem, S., i N. Ramya. "File Fragmentation to Improve Security in Cloud Using Graph Topology Grid Algorithm: A Survey". Asian Journal of Computer Science and Technology 8, S2 (5.03.2019): 46–51. http://dx.doi.org/10.51983/ajcst-2019.8.s2.2026.
Pełny tekst źródłaKaur, Amandeep, i Mr Pawan Luthra. "ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING USING HYBRID ENCRYPTION ALGORITHM AND FRAGMENTATION: A REVIEW". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, nr 8 (2.06.2015): 5987–93. http://dx.doi.org/10.24297/ijct.v14i8.1859.
Pełny tekst źródłaRani, K. Sasi Kala, i S. N. Deepa. "Hybrid evolutionary computing algorithms and statistical methods based optimal fragmentation in smart cloud networks". Cluster Computing 22, S1 (27.12.2017): 241–54. http://dx.doi.org/10.1007/s10586-017-1547-3.
Pełny tekst źródłaMonjezi, Masoud, Hasan Ali Mohamadi, Bahare Barati i Manoj Khandelwal. "Application of soft computing in predicting rock fragmentation to reduce environmental blasting side effects". Arabian Journal of Geosciences 7, nr 2 (23.11.2012): 505–11. http://dx.doi.org/10.1007/s12517-012-0770-8.
Pełny tekst źródłaBaharlouii, M., D. Mafi Gholami i M. Abbasi. "INVESTIGATING MANGROVE FRAGMENTATION CHANGES USING LANDSCAPE METRICS". ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W18 (18.10.2019): 159–62. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w18-159-2019.
Pełny tekst źródłaAnderton, Nicole, i Michiel Postema. "Fragmentation thresholds simulated for antibubbles with various infinitesimal elastic shells". Current Directions in Biomedical Engineering 8, nr 2 (1.08.2022): 73–76. http://dx.doi.org/10.1515/cdbme-2022-1020.
Pełny tekst źródłaSridharan, R., i S. Domnic. "Placement Strategy for Intercommunicating Tasks of an Elastic Request in Fog-Cloud Environment". Scalable Computing: Practice and Experience 20, nr 2 (2.05.2019): 335–48. http://dx.doi.org/10.12694/scpe.v20i2.1526.
Pełny tekst źródłaArmony, Gad, Sven Brehmer, Tharan Srikumar, Lennard Pfennig, Fokje Zijlstra, Dennis Trede, Gary Kruppa, Dirk J. Lefeber, Alain J. van Gool i Hans J. C. T. Wessels. "The GlycoPaSER Prototype as a Real-Time N-Glycopeptide Identification Tool Based on the PaSER Parallel Computing Platform". International Journal of Molecular Sciences 24, nr 9 (26.04.2023): 7869. http://dx.doi.org/10.3390/ijms24097869.
Pełny tekst źródłaLiu, Xiulei, Shoulu Hou, Qiang Tong, Xuhong Liu, Zhihui Qin i Junyang Yu. "A Prediction Approach for Video Hits in Mobile Edge Computing Environment". Security and Communication Networks 2020 (17.11.2020): 1–6. http://dx.doi.org/10.1155/2020/8857564.
Pełny tekst źródłaKhobragade, Shrutika, Rohini Bhosale i Rahul Jiwahe. "High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System." APTIKOM Journal on Computer Science and Information Technologies 5, nr 2 (22.04.2020): 54–59. http://dx.doi.org/10.34306/csit.v5i2.138.
Pełny tekst źródłaKhobragade, Shrutika, Rohini Bhosale i Rahul Jiwane. "High security mechanism: fragmentation and replication in the cloud with auto update in the system". Computer Science and Information Technologies 1, nr 2 (1.07.2020): 78–83. http://dx.doi.org/10.11591/csit.v1i2.p78-83.
Pełny tekst źródłaKhobragade, Shrutika, Rohini Bhosale i Rahul Jiwane. "High security mechanism: fragmentation and replication in the cloud with auto update in the system". Computer Science and Information Technologies 1, nr 2 (1.07.2020): 78–83. http://dx.doi.org/10.11591/csit.v1i2.pp78-83.
Pełny tekst źródłaZheng, Zhe, Yu Han, Yingying Chi, Fusheng Yuan, Wenpeng Cui, Hailong Zhu, Yi Zhang i Peiying Zhang. "Network Resource Allocation Algorithm Using Reinforcement Learning Policy-Based Network in a Smart Grid Scenario". Electronics 12, nr 15 (3.08.2023): 3330. http://dx.doi.org/10.3390/electronics12153330.
Pełny tekst źródłaMomenzadeh, Zahra, i Faramarz Safi-Esfahani. "Workflow scheduling applying adaptable and dynamic fragmentation (WSADF) based on runtime conditions in cloud computing". Future Generation Computer Systems 90 (styczeń 2019): 327–46. http://dx.doi.org/10.1016/j.future.2018.07.041.
Pełny tekst źródłaHung, Tran Van, i Chuan He Huang. "A Dynamic Data Fragmentation and Distribution Strategy for Main-Memory Database Cluster". Advanced Materials Research 490-495 (marzec 2012): 1231–36. http://dx.doi.org/10.4028/www.scientific.net/amr.490-495.1231.
Pełny tekst źródłaGao, Xianming, Baosheng Wang i Xiaozhe Zhang. "VR-Cluster: Dynamic Migration for Resource Fragmentation Problem in Virtual Router Platform". Scientific Programming 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/3976965.
Pełny tekst źródłaWang, Li Xuan, Li Fang Liu, Shen Ling Liu, Dong Chen i Yu Jiao Chen. "A Secured Distributed and Data Fragmentation Model for Cloud Storage". Applied Mechanics and Materials 347-350 (sierpień 2013): 2693–99. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2693.
Pełny tekst źródłaRajani, Mrs K., Y. Sreeja, T. Tejaswini i B. Manasa. "Optimal Performance of Security by Fragmentation and Replication of Data in Cloud". International Journal for Research in Applied Science and Engineering Technology 10, nr 8 (31.08.2022): 1547–50. http://dx.doi.org/10.22214/ijraset.2022.45151.
Pełny tekst źródłaMustafa, Rashed, Md Javed Hossain i Thomas Chowdhury. "A better way for finding the optimal number of nodes in a distributed database management system". Daffodil International University Journal of Science and Technology 4, nr 2 (10.02.2010): 19–22. http://dx.doi.org/10.3329/diujst.v4i2.4362.
Pełny tekst źródłaFathi, Mohamad Syazli, Mohammad Abedi i Norshakila Rawai. "The Potential of Cloud Computing Technology for Construction Collaboration". Applied Mechanics and Materials 174-177 (maj 2012): 1931–34. http://dx.doi.org/10.4028/www.scientific.net/amm.174-177.1931.
Pełny tekst źródłaPandian, Dr A. Pasumpon, i Dr Smys S. "Effective Fragmentation Minimization by Cloud Enabled Back Up Storage". Journal of Ubiquitous Computing and Communication Technologies 2, nr 1 (5.03.2020): 1–9. http://dx.doi.org/10.36548/jucct.2020.1.001.
Pełny tekst źródłaИванова, Е. В., i Л. Б. Соколинский. "Using Intel Xeon Phi coprocessors for execution of natural join on compressed data". Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), nr 4 (18.12.2015): 534–42. http://dx.doi.org/10.26089/nummet.v16r450.
Pełny tekst źródłaLi, Wei, Shuhua Li i Yuansheng Jiang. "Generalized Energy-Based Fragmentation Approach for Computing the Ground-State Energies and Properties of Large Molecules". Journal of Physical Chemistry A 111, nr 11 (marzec 2007): 2193–99. http://dx.doi.org/10.1021/jp067721q.
Pełny tekst źródłaXu, Xin, i Huiqun Yu. "A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing". Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/915878.
Pełny tekst źródłaAl-Bakri, Ali Y., i Mohammed Sazid. "Application of Artificial Neural Network (ANN) for Prediction and Optimization of Blast-Induced Impacts". Mining 1, nr 3 (26.11.2021): 315–34. http://dx.doi.org/10.3390/mining1030020.
Pełny tekst źródłaMenikarachchi, Lochana C., i José A. Gascón. "An extrapolation method for computing protein solvation energies based on density fragmentation of a graphical surface tessellation". Journal of Molecular Graphics and Modelling 30 (wrzesień 2011): 38–45. http://dx.doi.org/10.1016/j.jmgm.2011.06.001.
Pełny tekst źródłaRonkin, Mikhail V., Elena N. Akimova i Vladimir E. Misilov. "Review of deep learning approaches in solving rock fragmentation problems". AIMS Mathematics 8, nr 10 (2023): 23900–23940. http://dx.doi.org/10.3934/math.20231219.
Pełny tekst źródłaNixon, J. Sebastian, i Megersa Amenu. "Investigating Security Issues and Preventive Mechanisms in Ipv6 Deployment". International Journal of Advanced Engineering and Nano Technology 9, nr 2 (28.02.2022): 1–20. http://dx.doi.org/10.35940/ijaent.b0466.029222.
Pełny tekst źródłaAlekseev, Aleksandr V., i Nikolay N. Novitsky. "Information and computing spaces integration for operating enterprises of pipeline systems using “ANGARA” computer technology". E3S Web of Conferences 39 (2018): 04001. http://dx.doi.org/10.1051/e3sconf/20183904001.
Pełny tekst źródłaCoyle, Diane, i David Nguyen. "Cloud Computing, Cross-Border Data Flows and New Challenges for Measurement in Economics". National Institute Economic Review 249 (sierpień 2019): R30—R38. http://dx.doi.org/10.1177/002795011924900112.
Pełny tekst źródłaTakaki, Tomohiro, Shinji Sakane i Ryosuke Suzuki. "High-performance GPU computing of phase-field lattice Boltzmann simulations for dendrite growth with natural convection". IOP Conference Series: Materials Science and Engineering 1281, nr 1 (1.05.2023): 012056. http://dx.doi.org/10.1088/1757-899x/1281/1/012056.
Pełny tekst źródłaBeyer, Christoph, Stefan Bujack, Stefan Dietrich, Thomas Finnern, Martin Flemming, Patrick Fuhrmann, Martin Gasthuber i in. "Beyond HEP: Photon and accelerator science computing infrastructure at DESY". EPJ Web of Conferences 245 (2020): 07036. http://dx.doi.org/10.1051/epjconf/202024507036.
Pełny tekst źródłaZharinov, A. V. "ORGANIZATION OF THE TRANSMISSION OF SIGNALING MESSAGES IN THE COMPUTER NETWORKS OF THE AIRCRAFT". Izvestiya of Samara Scientific Center of the Russian Academy of Sciences 25, nr 1 (2023): 76–82. http://dx.doi.org/10.37313/1990-5378-2023-25-1-76-82.
Pełny tekst źródłaLubashevskiy, Vasily, Seval Yurtcicek Ozaydin i Fatih Ozaydin. "Improved Link Entropy with Dynamic Community Number Detection for Quantifying Significance of Edges in Complex Social Networks". Entropy 25, nr 2 (16.02.2023): 365. http://dx.doi.org/10.3390/e25020365.
Pełny tekst źródła