نتایج جستجو برای: it consumes time

تعداد نتایج: 4122593  

2015
Peter Xiang Gao Lukasz Golab Srinivasan Keshav

Solar panels have been improving in efficiency and dropping in price, and are therefore becoming more common and economically viable. However, the performance of solar panels depends not only on the weather, but also on other external factors such as shadow, dirt, dust, etc. In this paper, we describe a simple and practical data-driven method for classifying anomalies in the power output of sol...

Journal: :Experimental Physiology 2019

Journal: :Journal of Pediatric Health Care 2018

Journal: :Medical Journal of Australia 2014

Journal: :Journal of Clinical Orthopaedics and Trauma 2013

Journal: :Journal of Oral and Maxillofacial Surgery 2017

Journal: :Arthropod-Plant Interactions 2017

Journal: :IEICE Electronic Express 2015
Xinjie Huang Ning Wu Xiaoqiang Zhang Yaoping Liu

Evolvable hardware has been applied to the design of combinational logic circuits. But it usually takes too much time using evolutionary algorithm directly, especially designing large scale circuits. In this paper, a novel hybrid repair strategy is proposed, which is a combination of evolutionary repair method and Quine_McCluskey repair technique. Based on the hybrid repair strategy, an evoluti...

2006
Jie Guo Torsten Limberg Emil Matús Björn Mennenga Reimund Klemm Gerhard Fettweis

This paper presents a novel compiler backend which generates assembly code for Synchronous Transfer Architecture (STA). STA is a Very Long Instruction Word (VLIW) architecture and in addition it uses a non-orthogonal Instruction Set Architecture (ISA). Generating efficient code for this architecture needs highly optimizing techniques. The compiler backend presented in this paper is based on Int...

Journal: :I. J. Network Security 2016
Chung-Huei Ling Wei-Fu Hsien Min-Shiang Hwang

In the letter, we propose an improved model, which is built on AdjointVM. Our model can improve the situation where attackers can successfully intrude two adjacent virtual machines. Because of this situation, it will lead to the collapse of the entire cloud services. This model uses a double circular chain concept, which can be a virtual machine capable of double Intrusion Detection System dete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید