Listing 1 - 10 of 44 | << page >> |
Sort by
|
Choose an application
Group theory --- Homotopy groups. --- Homotopy theory. --- Loop spaces. --- Group theory. --- Groupes d'homotopie. --- Homotopie. --- Espaces de lacets. --- Groupes, Théorie des. --- Homotopy groups --- Homotopy theory --- Loop spaces --- Spaces, Loop --- Topological spaces --- Deformations, Continuous --- Topology --- Groups, Theory of --- Substitutions (Mathematics) --- Algebra
Choose an application
Algebraic topology --- 51 <082.1> --- Mathematics--Series --- Homotopy theory. --- Algebra, Homological. --- Representations of groups. --- Algebraic topology. --- Homotopie --- Algèbre homologique --- Représentations de groupes --- Topologie algébrique --- Algebra, Homological --- Homotopy theory --- Representations of groups --- Homological algebra --- Algebra, Abstract --- Homology theory --- Group representation (Mathematics) --- Groups, Representation theory of --- Group theory --- Deformations, Continuous --- Topology --- Homotopie. --- Algèbre homologique. --- Représentations de groupes. --- Topologie algébrique.
Choose an application
Choose an application
Topological groups. Lie groups --- 515.142 --- H-spaces --- Loop spaces --- Representations of groups --- Group representation (Mathematics) --- Groups, Representation theory of --- Group theory --- Spaces, Loop --- Homotopy theory --- Topological spaces --- Hopf spaces --- Spaces, Hopf --- Topological groups --- General theorems on fundamental categories and functors --- 515.142 General theorems on fundamental categories and functors --- Loop spaces. --- H-spaces. --- Representations of groups. --- Espaces de lacets --- H-espaces --- Représentations de groupes --- Espaces de lacets. --- H-espaces. --- Représentations de groupes.
Choose an application
Nombres, théorie des --- Nombres, théorie probabiliste des --- Number theory. --- Théorie des nombres --- Problèmes et exercices. --- Nombres, théorie des --- Nombres, théorie probabiliste des --- Théorie des nombres --- Problèmes et exercices. --- Nombres, Théorie des --- Theorie des nombres --- Mathematiques --- Problemes et exercices --- Exercices resolus --- Theorie probabiliste
Choose an application
Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms. Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration. Thus, Energy-aware Scheduling on Multiprocessor Platforms covers current research on this topic and classifies existing works according to two key standards, namely, homogeneity/heterogeneity of multiprocessor platforms and the task types considered. Under this classification, other sub-issues are also included, such as, slack reclamation, fixed/dynamic priority scheduling, partition-based/global scheduling, and application-specific power consumption, etc.
Computer scheduling. --- Electronic data processing -- Distributed processing. --- Multiprocessor. --- Electronic data processing --- Computer scheduling --- System design --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Electrical Engineering --- Distributed processing --- Multiprocessors. --- Engineering. --- Operations research. --- Decision making. --- Microprocessors. --- Electric power production. --- Electronic circuits. --- Energy Technology. --- Circuits and Systems. --- Processor Architectures. --- Operation Research/Decision Theory. --- Electronic digital computers --- Multiprogramming (Electronic computers) --- Parallel processing (Electronic computers) --- Systems engineering. --- Computer science. --- Energy Systems. --- Operations Research/Decision Theory. --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- System analysis --- Design and construction --- Energy systems. --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Minicomputers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Decision making
Choose an application
This brief summarizes the most commonly used sulfur dioxide surrogates and also shows the diverse reactivities to highlight the advances made in the development of synthetic methods through the insertion of sulfur dioxide. Depending on the nature of the transformation, these reactions are classified into four types: (i) pericyclic reactions; (ii) nucleophilic addition with organometallic reagents; (iii) transition metal catalysis; and (iv) free radical reactions. Highlighting recent advances in the insertion of sulfur dioxide, providing detailed descriptions of the experimental procedures for these valuable reactions, and discussing the remaining challenges in this field, the brief offers an appealing and highly useful guide for a wide readership in organic chemistry and medicinal chemistry from both academia and industry.
Organic compounds --- Sulfur dioxide. --- Synthesis. --- Sulfurous anhydride --- Sulphur dioxide --- Chemistry, Organic --- Chemistry, Synthetic organic --- Organic synthesis (Chemistry) --- Synthetic organic chemistry --- Synthesis --- Chemistry. --- Organometallic chemistry. --- Chemical engineering. --- Medicinal chemistry. --- Organometallic Chemistry. --- Medicinal Chemistry. --- Industrial Chemistry/Chemical Engineering. --- Sulfur oxides --- Chemistry, Organic. --- Biochemistry. --- Chemistry, Industrial --- Engineering, Chemical --- Industrial chemistry --- Engineering --- Chemistry, Technical --- Metallurgy --- Biological chemistry --- Chemical composition of organisms --- Organisms --- Physiological chemistry --- Biology --- Chemistry --- Medical sciences --- Organic chemistry --- Composition --- Organometallic chemistry . --- Chemistry, Medical and pharmaceutical --- Chemistry, Pharmaceutical --- Drug chemistry --- Drugs --- Medical chemistry --- Medicinal chemistry --- Pharmacochemistry --- Chemistry, Organometallic --- Metallo-organic chemistry
Choose an application
This book focuses on AdS3/CFT2, addressing different aspects of this correspondence in field theory and in gravity, including entanglement entropy, higher genus partition function, and conformal block. Holographic entanglement entropy is an important area in holographic and quantum information, which implies a deep relation between geometry and quantum entanglement. In this book, the authors use holographic entanglement entropy as a tool to investigate AdS3/CFT2. They study the entanglement entropy at high temperature in field theory and in holographics, and show that the results match each other in classical and one-loop order. In the AdS3/CFT2 system, they examine in detail the correspondence, exploring the higher genus partition function, entanglement entropy in a general system and conformal block, and they find good correspondence in field theory and gravity. The result strongly supports AdS3/CFT2 correspondence. In addition, they develop several important techniques in 2d CFT and 3d gravity, which also offer inspiration for other fields.
Quantum entanglement. --- Entangled states (Quantum theory) --- Quantum theory --- Quantum field theory. --- String theory. --- Quantum computers. --- Spintronics. --- Quantum Field Theories, String Theory. --- Quantum Information Technology, Spintronics. --- Relativistic quantum field theory --- Field theory (Physics) --- Relativity (Physics) --- Fluxtronics --- Magnetoelectronics --- Spin electronics --- Spinelectronics --- Microelectronics --- Nanotechnology --- Computers --- Models, String --- String theory --- Nuclear reactions
Choose an application
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
Computer networks --- Computer security. --- Wireless communication systems. --- Mobile communication systems. --- Computer communication systems. --- Application software. --- Mobile and Network Security. --- Privacy. --- Wireless and Mobile Communication. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- Distributed processing --- Communication systems --- Protection --- Security measures --- Cloud computing --- Web services
Choose an application
This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization. Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computation tasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.
Crowdsourcing. --- Mobile computing. --- Electronic data processing --- Context-aware computing --- Portable computers --- Crowd sourcing --- Distributed cognition --- Computer networks. --- Wireless communication systems. --- Mobile communication systems. --- Computer networks—Security measures. --- Computer Communication Networks. --- Wireless and Mobile Communication. --- Mobile and Network Security. --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing
Listing 1 - 10 of 44 | << page >> |
Sort by
|