Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
12,022 result(s) for "Computer-based"
Sort by:
Systems biology (un)certainties
How can modelers restore confidence in systems and computational biology? Systems biology, some have claimed ( 1 ), attempts the impossible and is doomed to fail. Possible definitions abound, but systems biology is widely understood to be an approach for studying the behavior of systems of interacting biological components that combines experiments with computational and mathematical reasoning. Modeling complex systems occurs throughout the sciences, so it may not be immediately clear why it should attract greater skepticism in molecular and cell biology than in other scientific disciplines. The way in which biological models are often presented and interpreted (and overinterpreted) may be partly to blame. As with experimental results, the key to successfully reporting a mathematical model is to provide an honest appraisal and representation of uncertainty in the model's predictions, parameters, and (where appropriate) in the structure of the model itself.
Quantum computational supremacy
The field of quantum algorithms aims to find ways to speed up the solution of computational problems by using a quantum computer. A key milestone in this field will be when a universal quantum computer performs a computational task that is beyond the capability of any classical computer, an event known as quantum supremacy. This would be easier to achieve experimentally than full-scale quantum computing, but involves new theoretical challenges. Here we present the leading proposals to achieve quantum supremacy, and discuss how we can reliably compare the power of a classical computer to the power of a quantum computer. Proposals for demonstrating quantum supremacy, when a quantum computer supersedes any possible classical computer at a specific task, are reviewed.
Applications of Wireless Sensor Networks: An Up-to-Date Survey
Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. As a result, from their first appearance until the present day, Wireless Sensor Networks have had a continuously growing range of applications. The purpose of this article is to provide an up-to-date presentation of both traditional and most recent applications of Wireless Sensor Networks and hopefully not only enable the comprehension of this scientific area but also facilitate the perception of novel applications. In order to achieve this goal, the main categories of applications of Wireless Sensor Networks are identified, and characteristic examples of them are studied. Their particular characteristics are explained, while their pros and cons are denoted. Next, a discussion on certain considerations that are related with each one of these specific categories takes place. Finally, concluding remarks are drawn.
Post-quantum cryptography
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence. The era of fully fledged quantum computers threatens to destroy internet security as we know it; the ways in which modern cryptography is developing solutions are reviewed.