Search alternatives:
sharing algorithm » learning algorithms (Expand Search), search algorithm (Expand Search), swarm algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data sharing » data hiding (Expand Search)
sharing algorithm » learning algorithms (Expand Search), search algorithm (Expand Search), swarm algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data sharing » data hiding (Expand Search)
-
1
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
Published 2016“…In a data sharing system in a cloud computing environment, such as health care system, peers or data sources execute transactions on-the-fly in response to user queries without any centralized control. …”
Get full text
Get full text
Get full text
Get full text
article -
2
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
Published 2007“…This paper presents an efficient method for concurrent built-in self-test synthesis and test scheduling in high-level synthesis. …”
Get full text
Get full text
Get full text
article -
3
-
4
A neural networks algorithm for data path synthesis
Published 2003“…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
Get full text
Get full text
Get full text
article -
5
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
6
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…The implementation nuances involve data and model sharing among allies and partners working on the same domain. …”
Get full text
Get full text
-
7
-
8
-
9
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
10
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…The improvement of information technology in the past few years has been encouraging the healthcare sector to share medical data online without any barriers and between different parties. …”
Get full text
Get full text
Get full text
masterThesis -
11
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
12
-
13
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
14
-
15
A parallel search tree algorithm for vertex cover on graphical processing units. (c2013)
Published 2013Get full text
Get full text
masterThesis -
16
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
17
-
18
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
19
Topics in graph algorithms
Published 2003“…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
Get full text
Get full text
Get full text
masterThesis -
20
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article