標題: Titlebook: High Performance Computing for Computational Science - VECPAR 2002; 5th International Co José M. L. M. Palma,A. Augusto Sousa,Vicente Herná [打印本頁] 作者: 時間 時間: 2025-3-21 20:10
書目名稱High Performance Computing for Computational Science - VECPAR 2002影響因子(影響力)
書目名稱High Performance Computing for Computational Science - VECPAR 2002影響因子(影響力)學科排名
書目名稱High Performance Computing for Computational Science - VECPAR 2002網(wǎng)絡公開度
書目名稱High Performance Computing for Computational Science - VECPAR 2002網(wǎng)絡公開度學科排名
書目名稱High Performance Computing for Computational Science - VECPAR 2002被引頻次
書目名稱High Performance Computing for Computational Science - VECPAR 2002被引頻次學科排名
書目名稱High Performance Computing for Computational Science - VECPAR 2002年度引用
書目名稱High Performance Computing for Computational Science - VECPAR 2002年度引用學科排名
書目名稱High Performance Computing for Computational Science - VECPAR 2002讀者反饋
書目名稱High Performance Computing for Computational Science - VECPAR 2002讀者反饋學科排名
作者: DAMN 時間: 2025-3-21 21:58 作者: 有權 時間: 2025-3-22 04:03
José L. A. Rosa,Nelson F. F. Ebeckenient Boosting, XGBoost, Random Forest, and Extra Trees Classification are used to estimate whether the individual is normal or affected by Parkinson’s disease. According to this study, the ensemble method Gradient Boosting classification algorithm outperformed other classification algorithms in term作者: esoteric 時間: 2025-3-22 05:39 作者: PRO 時間: 2025-3-22 12:43 作者: 不愿 時間: 2025-3-22 14:07 作者: 黃油沒有 時間: 2025-3-22 19:37
Ester M. Garzón,Inmaculada García,José Jesús Fernándeztails and present a synthesized body of knowledge. We identify the growing trend where security attacks are launched from the cyber space to vehicle control system via smartphones and vehicle networks. In the foreseeable future, we expect more security attacks both in numbers and in complexity. Know作者: municipality 時間: 2025-3-22 22:36
Gerhard Wellein,Georg Hager,Achim Basermann,Holger Fehskeed more opportunities for the current cyber-crimes. Protective mechanisms and relevant laws are being implemented to reduce cyber- crimes around the world. Contemporary and important mitigation approaches for cyber-crimes have also been articulated in this paper.作者: Hypomania 時間: 2025-3-23 03:17
High Performance Computing for Computational Science - VECPAR 20025th International Co作者: prick-test 時間: 2025-3-23 08:34
José M. L. M. Palma,A. Augusto Sousa,Vicente Herná作者: 透明 時間: 2025-3-23 13:34 作者: Endearing 時間: 2025-3-23 13:56
High Performance Data Miningorithms is challenging, and the main focus of the paper is a description of the parallel formulations of two important data mining algorithms: discovery of association rules, and induction of decision trees for classification. We also briefly discuss an application of data mining to the analysis of 作者: 割公牛膨脹 時間: 2025-3-23 21:28
High Performance Computing in Electron Microscope Tomography of Complex Biological Structuresfield, are presented in terms of computational demands as well as in reconstruction quality under highly noisy conditions. The combination of efficient iterative algorithms and HPC techniques have proved to be well suited for the reconstruction of large biological specimens in electron tomography, y作者: 音樂戲劇 時間: 2025-3-23 23:37
Conference proceedings 2003be considered as Computational Science and Engineering (CSE). The book comprises a total of 49 papers, with a prominent position reserved for the four invited talks and the two ?rst prizes of the best student paper competition.作者: nostrum 時間: 2025-3-24 03:08 作者: 調(diào)味品 時間: 2025-3-24 08:41
the HC-12 board as a Radio Frequency (Bluetooth) module. To achieve computations for data/signal processing, an STM32 microcontroller is chosen. An open-source Middleware—FreeRTOS is used for implementing RTOS in the microcontroller. The complete transceiver system consists of an electronic remote 作者: CLASH 時間: 2025-3-24 12:02
Rainald L?hner,Joseph D. Baum,Charles Charman,Daniele Pelessoney increasing. However, due to the complex and diverse production environment for gas production, abnormal events that occur during the production of natural gas wells will reduce the gas production of gas wells with sufficient gas reservoirs. At present, detecting abnormal event in gas production ma作者: 固執(zhí)點好 時間: 2025-3-24 15:29
Marc Lange the HC-12 board as a Radio Frequency (Bluetooth) module. To achieve computations for data/signal processing, an STM32 microcontroller is chosen. An open-source Middleware—FreeRTOS is used for implementing RTOS in the microcontroller. The complete transceiver system consists of an electronic remote 作者: 媒介 時間: 2025-3-24 22:24 作者: agonist 時間: 2025-3-25 03:07
Rubens M. Sydenstricker,Marcos A. D. Martins,Alvaro L. G. A. Coutinho,José L. D. Alveswill process and extract effective information, which leads to the uneven distribution of traffic. An external attacker who can monitor traffic will find the location of the convergent node and attack it according to this feature. In order to protect the location of the sink node in the wireless sen作者: Cpr951 時間: 2025-3-25 06:20
Francisco Quaranta,Maria C. S. de Castro,José L. D. Alves,Claudio L. de Amorim security is the most urgent issue related to cloud computing. Studies have shown that order-preserving encryption (OPE) technology is an effective way of securing privacy in the cloud. This study proposes a multi-user order- preserving encryption scheme in cloud environments (MUOPE). The scheme loc作者: Arthropathy 時間: 2025-3-25 11:25 作者: resistant 時間: 2025-3-25 13:25
Jing-Ru C. Cheng,Paul E. Plassmann order to realize the security policy that low security level information in the multi-level security system can only flow to equal or higher security levels, it establishes a security system with security level for Seal calculus, and uses static type detection to realize fine particle size access c作者: 內(nèi)閣 時間: 2025-3-25 18:08 作者: 清唱劇 時間: 2025-3-25 23:59 作者: vitreous-humor 時間: 2025-3-26 03:05 作者: SIT 時間: 2025-3-26 06:58 作者: PAC 時間: 2025-3-26 08:58 作者: 針葉樹 時間: 2025-3-26 16:26
Tom Goodale,Gabrielle Allen,Gerd Lanfermann,Joan Massó,Thomas Radke,Edward Seidel,John Shalf image into blocks with size 8.8 and transform each block into three-dimensional image of binary number with size 8.8.8. Then, preprocess the real chaotic sequences output by Chua’s system and revise grey level of the pixel in three-dimensional image according to sequences value. Finally, use baker’作者: 啤酒 時間: 2025-3-26 18:35 作者: NORM 時間: 2025-3-27 00:45
Ben Popoola,Paul Gougher TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics作者: Cougar 時間: 2025-3-27 01:28 作者: Prostaglandins 時間: 2025-3-27 09:01
Ester M. Garzón,Inmaculada García,José Jesús Fernándezrchitecture is specialized into vehicle infotainment system (e.g., SYNC of Ford, iDrive of BMW and MMI of Audi), Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), and vehicle social system which connects to social media networks. These systems hold private and sensitive information such as 作者: 誘使 時間: 2025-3-27 11:06 作者: 教義 時間: 2025-3-27 14:30 作者: Defraud 時間: 2025-3-27 18:08
Fluid-Structure Interaction Simulations Using Parallel Computersshock-structure interaction problems. For the fluid, a high-resolution FEM-FCT solver based on unstructured grids is used. The surface motion is handled either by moving, body fitted grids, or via surface embedding. For the structure, a Lagrangean large-deformation finite element code is employed. T作者: Infant 時間: 2025-3-28 01:47 作者: effrontery 時間: 2025-3-28 05:24 作者: PAC 時間: 2025-3-28 10:18 作者: 細微差別 時間: 2025-3-28 11:57
Finite Element Simulation of Seismic Elastic Two Dimensional Wave Propagation: Development and Assesal to study the structure of the earth’s interior and exploring petroleum reservoirs. Using a representative FEM-based application, we propose and evaluate two parallel algorithms based on the inverse mapping and on the mesh coloring, respectively. The distinguishing feature of our parallel versions作者: Vasodilation 時間: 2025-3-28 14:46
Parallel Implementation for Probabilistic Analysis of 3D Discrete Cracking in Concrete parallel vector processor (PVP). The computational strategies used for each realization, within the framework of Monte Carlo simulation, are the inexact Newton method to solve the highly nonlinear problem and element-by-element (EBE) iterative strategies considering that nonlinear behavior is restr作者: 開始沒有 時間: 2025-3-28 19:31 作者: Verify 時間: 2025-3-29 00:06
High Performance Data Miningtomated data-driven techniques of extracting useful knowledge. Data mining, an important step in this process of knowledge discovery, consists of methods that discover interesting, non-trivial, and useful patterns hidden in the data [SAD+93, CHY96]. The field of data mining builds upon the ideas fro作者: 噱頭 時間: 2025-3-29 03:53 作者: 秘傳 時間: 2025-3-29 11:10 作者: 相符 時間: 2025-3-29 14:14
High Performance Computing in Electron Microscope Tomography of Complex Biological Structuresmens, with a special emphasis upon the computational perspective. Efficient iterative algorithms that are characterized by a fast convergence rate have been used to tackle the image reconstruction problem. The use of smooth basis functions provides the reconstruction algorithms with an implicit regu作者: Parley 時間: 2025-3-29 19:14
Visualization of RNA Pseudoknot Structuresules such as frame-shifting, read-through, and the initiation of translation. There exists no automatic method for drawing RNA pseudoknot structures, and thus representing RNA pseudoknots currently relies on significant amount of manual work. This paper describes the first algorithm for automaticall作者: nauseate 時間: 2025-3-29 20:42
The Cactus Framework and Toolkit: Design and Applicationsemical engineering.We first motivate by example the need for such frameworks to support multi-platform, high performance applications across diverse communities. We then describe the design of the latest release of Cactus (Version 4.0) a complete rewrite of earlier versions, which enables highly mod作者: definition 時間: 2025-3-30 03:53 作者: 統(tǒng)治人類 時間: 2025-3-30 04:45
Evaluating the Performance of Space Plasma Simulations Using FPGA’s (FPGAs). Although FPGA’s run at slower clock speeds than their off-the-shelf counterparts, the processing power lost in the reduced number of clock cycles per second is quickly recovered in the high degree of spatial parallelism that is achievable within the devices. We describe the development of 作者: 重力 時間: 2025-3-30 10:45
Remote Parallel Model Reduction of Linear Time-Invariant Systems Made Easybrary is enhanced with a mail service which serves as a demonstrator of the capabilities of the library. Remote requests submitted via e-mail are executed on a cluster composed of Intel Pentium-II nodes connected via a Myrinet switch. Experimental results show the numerical and parallel performances作者: Exclude 時間: 2025-3-30 16:26
An Approach to Teaching Computer Arithmeticn undergraduate courses in computer science and engineering. Our approach is based upon a set of carefully designed practical exercises which highlights the main properties and computational issues of the representation. In conjunction to the exercises, an auxiliary computer-based environment consti作者: Ascendancy 時間: 2025-3-30 16:43
Fast Sparse Matrix-Vector Multiplication for TeraFlop/s Computersue algorithms is a matrix-vector multiplication (MVM) involving the large sparse matrix. We present three different programming approaches for parallel MVM on present day supercomputers. In addition to a pure message-passing approach, two hybrid parallel implementations are introduced based on simul作者: CURL 時間: 2025-3-31 00:01 作者: 偏狂癥 時間: 2025-3-31 02:36
per the user’s requirements. The controller’s application in future research prospects ranges from the manual operation of industrial machinery to the safety testing/prototyping of medical robots. The overall system is fast, reliable and convenient.作者: Mercantile 時間: 2025-3-31 07:43 作者: 伙伴 時間: 2025-3-31 10:42
Rubens M. Sydenstricker,Marcos A. D. Martins,Alvaro L. G. A. Coutinho,José L. D. Alvesk nodes, transmits real data to the sink node and transmits false data to the false sink node. By hiding the location of the sink node, the security time is increased. Theoretical analysis and simulation experiment results show that KAFP can protect privacy of convergent nodes at lower energy consumption when the value of K is properly selected.作者: 山間窄路 時間: 2025-3-31 13:35 作者: NUDGE 時間: 2025-3-31 20:08 作者: filial 時間: 2025-3-31 22:27 作者: 宣稱 時間: 2025-4-1 05:21 作者: 懸崖 時間: 2025-4-1 06:57
Fast Sparse Matrix-Vector Multiplication for TeraFlop/s Computersid implementations are discussed and compared with the pure message-passing approach on massively-parallel systems (CRAY T3E), vector computers (NEC SX5e) and distributed shared-memory systems (SGI Origin3800).