Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
12,022
result(s) for
"Computer-based"
Sort by:
Systems biology (un)certainties
by
Kirk, P. D. W.
,
Babtie, A. C.
,
Stumpf, M. P. H.
in
Biology
,
Computer based modeling
,
Mathematical models
2015
How can modelers restore confidence in systems and computational biology? Systems biology, some have claimed ( 1 ), attempts the impossible and is doomed to fail. Possible definitions abound, but systems biology is widely understood to be an approach for studying the behavior of systems of interacting biological components that combines experiments with computational and mathematical reasoning. Modeling complex systems occurs throughout the sciences, so it may not be immediately clear why it should attract greater skepticism in molecular and cell biology than in other scientific disciplines. The way in which biological models are often presented and interpreted (and overinterpreted) may be partly to blame. As with experimental results, the key to successfully reporting a mathematical model is to provide an honest appraisal and representation of uncertainty in the model's predictions, parameters, and (where appropriate) in the structure of the model itself.
Journal Article
Quantum computational supremacy
2017
The field of quantum algorithms aims to find ways to speed up the solution of computational problems by using a quantum computer. A key milestone in this field will be when a universal quantum computer performs a computational task that is beyond the capability of any classical computer, an event known as quantum supremacy. This would be easier to achieve experimentally than full-scale quantum computing, but involves new theoretical challenges. Here we present the leading proposals to achieve quantum supremacy, and discuss how we can reliably compare the power of a classical computer to the power of a quantum computer.
Proposals for demonstrating quantum supremacy, when a quantum computer supersedes any possible classical computer at a specific task, are reviewed.
Journal Article
Applications of Wireless Sensor Networks: An Up-to-Date Survey
by
Nakas, Christos
,
Koulouras, Grigorios
,
Vomvas, Dimitrios
in
Computer based research
,
Wireless sensor networks
,
wireless sensors
2020
Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. As a result, from their first appearance until the present day, Wireless Sensor Networks have had a continuously growing range of applications. The purpose of this article is to provide an up-to-date presentation of both traditional and most recent applications of Wireless Sensor Networks and hopefully not only enable the comprehension of this scientific area but also facilitate the perception of novel applications. In order to achieve this goal, the main categories of applications of Wireless Sensor Networks are identified, and characteristic examples of them are studied. Their particular characteristics are explained, while their pros and cons are denoted. Next, a discussion on certain considerations that are related with each one of these specific categories takes place. Finally, concluding remarks are drawn.
Journal Article
Post-quantum cryptography
2017
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.
The era of fully fledged quantum computers threatens to destroy internet security as we know it; the ways in which modern cryptography is developing solutions are reviewed.
Journal Article