Moozonian
Web Images Developer News Books Maps Shopping Moo-AI Generate Art
Showing results for Computing
Titan-Apex v9.4 is analyzing data for 'Computing'...
icon https://www.bing.com/ck/a?!&&p=d48d89a7ba1d64d3c87b32d494e34c03e73cd449d03ae086209f2b2320d717c9JmltdHM9MTc3Mjc1NTIwMA&ptn=3&ver=2&hsh=4&fclid=15a41746-f80e-631d-12b2-0052f9c362ae&u=a1aHR0cHM6Ly93d3cudGhlaW5mb3JtYXRpb24uY29tL2FydGljbGVzL2luc2lkZS1vcGVuYWlzLXNjcmFtYmxlLWdldC1jb21wdXRpbmctcG93ZXItc3RhcmdhdGUtc3RhbGxlZA&ntb=1

Inside OpenAI’s Scramble to Get Computing Power After ...

Feb 22, 2026 · Exclusive Inside OpenAI’s Scramble to Get Computing Power After Stargate Stalled Data center joint venture launched at the White House has not staffed up and is not developing Op...
icon http://arxiv.org/abs/1409.5054v1

TCP Performance for Kurd Messenger Application Using Bio-computin...

This work was conducted to design, implement, and evaluate a new model of measuring Transmission Control Protocol (TCP) performance of real time network. The proposed model Biological Kurd Messenger (...
icon http://arxiv.org/abs/1108.2111v1

Context Protecting Privacy Preservation in Ubiquitous Computing

In ubiquitous computing domain context awareness is an important issue. So, in ubiquitous computing, mere protection of message confidentiality is not sufficient for most of the applications where con...
icon https://github.com/ourresearch/openalex-guts

ourresearch/openalex-guts

The guts for computing data for OpenAlex. For more, see https://openalex.org/. (⭐ 152)
icon http://arxiv.org/abs/2406.02349v1

CADE: Cosine Annealing Differential Evolution for Spiking Neural ...

Spiking neural networks (SNNs) have gained prominence for their potential in neuromorphic computing and energy-efficient artificial intelligence, yet optimizing them remains a formidable challenge for...
icon http://arxiv.org/abs/2503.15819v1

Control Pneumatic Soft Bending Actuator with Online Learning Pneu...

The intrinsic nonlinearities of soft robots present significant control but simultaneously provide them with rich computational potential. Reservoir computing (RC) has shown effectiveness in online le...
icon http://arxiv.org/abs/1703.10231v1

A $4,000 Workstation for Mammalian Genome Assembly with Long Read...

Long-read sequencing has enabled the de novo assembly of several mammalian genomes, but with high cost in computing. Here, we demonstrated de novo assembly of mammalian genome using long reads in an e...
icon http://arxiv.org/abs/1706.09279v1

The Quantum Complexity of Computing Schatten $p$-norms

We consider the quantum complexity of computing Schatten $p$-norms and related quantities, and find that the problem of estimating these quantities is closely related to the one clean qubit model of c...
icon http://arxiv.org/abs/1301.0793v1

The Complexity of Scheduling for p-norms of Flow and Stretch

We consider computing optimal k-norm preemptive schedules of jobs that arrive over time. In particular, we show that computing the optimal k-norm of flow schedule, is strongly NP-hard for k in (0, 1) ...
icon http://arxiv.org/abs/cs/0404045v2

Speculation on graph computation architectures and computing via ...

A speculative overview of a future topic of research. The paper is a collection of ideas concerning two related areas: 1) Graph computation machines ("computing with graphs"). This is the class of m...
icon http://arxiv.org/abs/1902.05358v1

Online Supervisory Control and Resource Management for Energy Har...

The convergence of communication and computing has lead to the emergence of Multi-access Edge Computing (MEC), where computing resources (supported by Virtual Machines (VMs)) are distributed at the ed...
icon http://arxiv.org/abs/1906.05008v1

Adaptive Resource Management for a Virtualized Computing Platform...

In virtualized computing platforms, energy consumption is related to the computing-plus-communication processes. However, most of the proposed energy consumption models and energy saving solutions fou...
icon http://arxiv.org/abs/1911.10550v1

MEC-enabled Energy Cooperation for Sustainable 5G Networks Exploi...

The substantial growth in wireless data traffic, and the emergence of delay-sensitive application/services requiring ultra-low latency, has resulted into a new Mobile Network (MN) design paradigm call...
icon http://arxiv.org/abs/1808.07226v2

Mean-field approximation, convex hierarchies, and the optimality ...

The free energy is a key quantity of interest in Ising models, but unfortunately, computing it in general is computationally intractable. Two popular (variational) approximation schemes for estimating...
icon http://arxiv.org/abs/2412.05359v1

Accidental Symmetries, Hilbert Series, and Friends

Accidental symmetries in effective field theories can be established by computing and comparing Hilbert series. This invites us to study them with the tools of invariant theory. Applying this technolo...
icon http://arxiv.org/abs/2112.15175v1

Algorithmic Strategies for seizing Quantum Computing

Quantum computing is a nascent technology with prospects to have a huge impact in the world. Its current status, however, only counts on small and noisy quantum computers whose performance is limited....
icon http://arxiv.org/abs/2411.15332v1

Mera: Memory Reduction and Acceleration for Quantum Circuit Simul...

With the development of quantum computing, quantum processor demonstrates the potential supremacy in specific applications, such as Grovers database search and popular quantum neural networks (QNNs). ...
icon http://arxiv.org/abs/2108.02655v2

Sinkless Orientation Made Simple

The sinkless orientation problem plays a key role in understanding the foundations of distributed computing. The problem can be used to separate two fundamental models of distributed graph algorithms,...
icon http://arxiv.org/abs/2406.13438v2

Computing the center of a fusion category

We present an algorithm for explicitly computing the categorical (Drinfeld) center of a pivotal fusion category. Our approach is based on decomposing the images of simple objects under the induction f...
icon https://www.bing.com/ck/a?!&&p=546e0f462abbfbb73fab9794e936b1aa348b4da96560f8461d3d3f2118879774JmltdHM9MTc3Mjg0MTYwMA&ptn=3&ver=2&hsh=4&fclid=2709d461-61cb-6f75-1d27-c37460916e10&u=a1aHR0cHM6Ly93d3cud29yZHJlZmVyZW5jZS5jb20vZGVmaW5pdGlvbi9yZXRyaWV2ZQ&ntb=1

retrieve - WordReference.com Dictionary of English

re•trieve /rɪˈtriv/ v. [~ + object], -trieved, -triev•ing. to find and bring back: The dog retrieved the Frisbee. Computing to locate and read (data) from computer storage, as for display on a m...