Showing 81 - 100 results of 186 for search 'ELECTRICAL MACHINES', query time: 1.15s Refine Results
  1. 81
    by Blumer, Aric David
    Published 2014
    ... modeled using Finite State Machines (FSMs). Upon FSMs are built programs, processes, migration realms...
    Get full text
    Get full text
    Others
  2. 82
    by Mehrab, A K M Fazla
    Published 2018
    ...The data centers are composed of resource-rich expensive server machines. A server, overloadeded...
    Get full text
    Others
  3. 83
    by Hall, Kristopher Joseph
    Published 2014
    ... subverted hundreds of thousands of machines. Network stealth worms exacerbate that threat by using...
    Get full text
    Get full text
    Others
  4. 84
    by Zaremski, Brian Zachary
    Published 2014
    ... machines in existence. Electrical phenomena in such a complex system can inflict serious self-harm...
    Get full text
    Get full text
    Others
  5. 85
    by Littley, Michael Brian
    Published 2018
    ...Containers are an alternative to virtual machines rapidly increasing in popularity due...
    Get full text
    Others
  6. 86
    by Chiba, Daniel Juzer
    Published 2019
    ...Unikernels are lightweight, single-purpose virtual machines designed for the cloud. They provide...
    Get full text
    Others
  7. 87
    by Lehn, David Ilan
    Published 2014
    ...<p>The reprogrammable nature of configurable computing machines has led to a wealth of research...
    Get full text
    Get full text
    Others
  8. 88
    by Atwell, James W.
    Published 2014
    ...Configurable computing machines (CCMs) are available as plug in cards for standard workstations...
    Get full text
    Get full text
    Others
  9. 89
    by Zhang, Moqi
    Published 2021
    ..., machines are brilliant in learning new things and never sleep. Suppose machines can be used to replace...
    Get full text
    Others
  10. 90
    by Shehada, Ahmed
    Published 2018
    ... performance is required. A small part of this work is also dedicated to brushless dc machines. Control methods...
    Get full text
    Others
  11. 91
    by Ramachandran, Karthik
    Published 2014
    ... emphasis in the area of Custom Computing Machines, many physical problems are being solved using...
    Get full text
    Get full text
    Others
  12. 92
    by Hess, Jason Richard
    Published 2014
    ... requires custom hardware if it is to be performed at acceptable speeds. Configurable computing machines...
    Get full text
    Get full text
    Others
  13. 93
    by Nandwani, Mukta
    Published 2014
    ... physical phenomena. The limited capabilities of desktop machines make them unsuitable for handling...
    Get full text
    Get full text
    Others
  14. 94
    by Tbaileh, Ahmad Anan
    Published 2014
    ... groups of machines of a power system. This will allow us to carry out a model reduction of a large-scale...
    Get full text
    Others
  15. 95
    by O'Connor, R. Brendan
    Published 2014
    ... in multi-FPGA Custom Computing Machines (CCMs) has provided the potential to execute large sections...
    Get full text
    Get full text
    Others
  16. 96
    by Agrawal, Harsh
    Published 2016
    ... must repeatedly solve the same low-level problems: building and maintaining a cluster of machines...
    Get full text
    Others
  17. 97
    by Soni, Maneesh
    Published 2014
    ...Until now, the performance improvement of computing machines was a mostly a result of shrinking...
    Get full text
    Get full text
    Others
  18. 98
    by Kakusa, Takondwa Lisungu
    Published 2018
    ... or scenario. The problem with current natural language systems used in machines, though...
    Get full text
    Others
  19. 99
    by He, Yingchun
    Published 2014
    ... architectures for many high performance embedded applications. These machines support parallel computation...
    Get full text
    Get full text
    Others
  20. 100
    by DiMarco, Peter Lewis
    Published 2013
    ...A Denial-of-Service (DoS) attack is a network attack from a single machine that attempts to prevent...
    Get full text
    Others