Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,849,645 papers from all fields of science
Search
Sign In
Create Free Account
Real computation
Known as:
Real computer
In computability theory, the theory of real computation deals with hypothetical computing machines using infinite-precision real numbers. They are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Analog computer
Bekenstein bound
Blum–Shub–Smale machine
Computability theory
Expand
Broader (1)
Theory of computation
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Application of Formalization Method in Construction ZigBee Technology and RFID System in Internet of Things
Chunlin Kuang
,
Weiling Li
International Congress of Mathematicans
2015
Corpus ID: 58911296
RFID technology is the use of radio frequency signal through space coupling to achieve non-contact transmission of information…
Expand
2015
2015
Model Checking Process Scheduling over Multi-core Computer System with MSVL
Xinfeng Shu
,
Zhenhua Duan
SOFL+MSVL
2015
Corpus ID: 2916304
To solve the problem that software testing cannot meet the verification needs of process scheduling over multi-core computer…
Expand
2010
2010
Scaling up Detection Rates and Reducing False Positives in Intrusion Detection using NBTree
D. Farid
,
Nguyen Huu Hoa
,
J. Darmont
,
Nouria Harbi
,
Mohammad Zahidur Rahman
2010
Corpus ID: 2925214
In this paper, we present a new learning algorithm for anomaly based network intrusion detection using improved self adaptive…
Expand
2010
2010
Light weight sector mapping scheme for NAND-based block devices
I. Shin
IEEE transactions on consumer electronics
2010
Corpus ID: 206633961
NAND-based block devices such as SD Card and USB Memory embed the special firmware called Flash Translation Layer (FTL) to…
Expand
2008
2008
A CAD System for Modeling and Simulation of Computer Networks Using Cellular Automata
V. Mardiris
,
G. Sirakoulis
,
Ch. Mizas
,
I. Karafyllidis
,
A. Thanailakis
IEEE Transactions on Systems Man and Cybernetics…
2008
Corpus ID: 23382565
The increasing complexity of computer networks calls for the development of new models for their simulation. Cellular automata…
Expand
2007
2007
Performance of Fast Multicast Algorithms in Real Networks
M. Piechowiak
,
P. Zwierzykowski
EUROCON Conference
2007
Corpus ID: 46450050
Multicast heuristic algorithms are currently the field of interest for networks researchers. The optimization analysis of fast…
Expand
2005
2005
Peer-to-Peer Networks as Collaborative Learning Environments
Johnny Biström
2005
Corpus ID: 1871115
The purpose of this paper is to study the use of peer-to-peer networks in combination with collaborative learning. The learning…
Expand
Highly Cited
2000
Highly Cited
2000
Word Association Computer Passwords: The Effect of Formulation Techniques on Recall and Guessing Rates
Rachael Pond
,
J. Podd
,
Julie Bunnell
,
Ron Henderson
Computers & security
2000
Corpus ID: 41761744
2000
2000
Building Real Computer Systems
A. Uht
,
Jien-Chung Lo
,
Ying Sun
,
J. Daly
,
J. Kowalski
IEEE Micro
2000
Corpus ID: 27774399
The authors describe a multiyear student project on the design and construction of hardware and software for a complete computer…
Expand
1997
1997
Delta-Languages for Sets and LOGSPACE Computable Graph Transformers
A. Lisitsa
,
V. Sazonov
Theoretical Computer Science
1997
Corpus ID: 7496901
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE