Regresar
Mostrando 10 resultados de: 1872
Filtros aplicados
Publisher
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(67)
Advances in Intelligent Systems and Computing(51)
Communications in Computer and Information Science(43)
IEEE Access(36)
RISTI - Revista Iberica de Sistemas e Tecnologias de Informacao(25)
Área temáticas
Física aplicada(465)
Métodos informáticos especiales(273)
Programación informática, programas, datos, seguridad(132)
Otras ramas de la ingeniería(115)
Funcionamiento de bibliotecas y archivos(82)
Área de conocimiento
Ciencias de la computación(554)
Simulación por computadora(197)
Red informática(175)
Optimización matemática(156)
Aprendizaje automático(155)
(Max,+) model for alignment selection and schedule optimization in a flow network
Conference ObjectAbstract: The following work presents an algebraic optimization model for the problem of scheduling operationsPalabras claves:Algebraic modeling, path search, pipeline networks, schedule optimizationAutores:José Lisandro Aguilar Castro, Niel E., Quintero K.Fuentes:scopus101 Development of a multi-phase-field-lattice Boltzmann model for multiple dendrites growing under melt convection
OtherAbstract: In this study, a combination of multi-phase-field method (MPFM) proposed by Steinbach 5) and the latPalabras claves:Autores:Roberto C. Rojas MolinaFuentes:google1Departamento de Ingenierıa Mecánica, Escuela Politécnica Nacional 2Research Center of Mathematical Modelling (MODEMAT) Quito, Ecuador 17-01-2759
OtherAbstract: Abstract 6 Safe execution of marine operations (MOs) depends on accurate prediction of vessel dynamiPalabras claves:Autores:Jesus Portilla-YandunFuentes:google2-Chloroethylisocyanate. Thermal decomposition and spectroscopic properties
ArticleAbstract: 2-Chloroethylisocyanate has been studied in a thorough way. NMR, Raman, FTIR, and Ar-matrix vibratioPalabras claves:Autores:Argüello G.A., Beckers H., Burgos Paci M.A., Ge M.F., Jios J.L., Luis A. Ramos-Guerrero, Martínez Córdoba G.A., Pepino J., Ulic S.E., Védova. C.O.D., Willner H.Fuentes:scopus2.1–Use Cases Definition and Requirements of the System and its Components. Main Editors: Luis Javier García Villalba, Ángel Leonardo Valdivieso Caraguay, Lorena Isabel Barona …
OtherAbstract:Palabras claves:Autores:Ángel Leonardo Valdivieso CaraguayFuentes:google2013 IEEE SDN for Future Networks and Services (SDN4FNS)
OtherAbstract:Palabras claves:Autores:Ángel Leonardo Valdivieso Caraguay, Lorena Isabel Barona LópezFuentes:google2022 Third International Conference on Information Systems and Software Technologies (ICI2ST)| 978-1-6654-5517-6/22/$31.00© 2022 IEEE| DOI: 10.1109/ICI2ST57350. 2022.00034
OtherAbstract: Author Index Toggle navigation IEEE Computer Society Digital Library Jobs Tech News Resource CenterPalabras claves:Autores:Boris Astudillo, José Lucio-Naranjo, Milton Escobar Sánchez, Roberto Omar AndradeFuentes:google2D semantic segmentation of the prostate gland in magnetic resonance images using convolutional neural networks
Conference ObjectAbstract: Convolutional Neural Networks is one of the most commonly used methods for automatic prostate segmenPalabras claves:Central Gland, convolutional neural networks, Encoder-Classifier, Encoder-Decoder, MRIs, NCI-ISBI 2013, Peripheral Zone, Prostate Segmentation, U-net, VGG16Autores:Marco E. Benalcázar, Silvia P. VacacelaFuentes:googlescopus2D static droplet simulation with shan-chen multiphase lattice boltzmann model
Conference ObjectAbstract: This paper presents the assessment of the capability of Shan-Chen (SC) Multiphase Lattice BoltzmannPalabras claves:Density ratio., Lattice Boltzmann, Multiphase flow, Shan-Chen model, Spurious currentsAutores:Kabdenova (Dauyeshova) B., Luis R. Rojas-Solórzano, Monaco E.Fuentes:scopus3BI-ECC: A Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Conference ObjectAbstract: Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the formPalabras claves:BLOCKCHAIN, CYBERSECURITY, elliptic curves cryptography, self-generated certificates, self-generated identityAutores:Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopus