Results 1 to 10 of about 1,374,683 (343)

A Survey of Computer Architecture Simulation Techniques and Tools

open access: yesIEEE Access, 2019
Computer architecture simulators play an important role in advancing computer architecture research. With wider research directions and the increased number of simulators that have been developed, it becomes harder to choose a particular simulator to use.
Ayaz Akram, Lina Sawalha
doaj   +2 more sources

A Cross-Prefetcher Schedule Optimization Methodology

open access: yesIEEE Access, 2022
Prefetching offers the potential to significantly improve performance by speculatively loading application data so that it is available before it is needed. By their very nature, prefetching techniques are application behavior dependant.
Razvan Nitu   +2 more
doaj   +1 more source

Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis

open access: yesFuture Internet, 2022
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman   +3 more
doaj   +1 more source

Verification of serialising instructions for security against transient execution attacks

open access: yesIET Computers & Digital Techniques, 2023
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti   +2 more
doaj   +1 more source

Most Resource Efficient Matrix Vector Multiplication on FPGAs

open access: yesIEEE Access, 2023
Fast and resource-efficient inference in artificial neural networks (ANNs) is of utmost importance and drives many new developments in the area of new hardware architectures, e.g., by means of systolic arrays or algorithmic optimization such as pruning ...
Alexander Lehnert   +4 more
doaj   +1 more source

Modeling Computing Devices and Processes by Information Operators

open access: yesProceedings, 2020
The concept of operator is exceedingly important in many areas as a tool of theoretical studies and practical applications. Here, we introduce the operator theory of computing, opening new opportunities for the exploration of computing devices, networks,
Mark Burgin, Gordana Dodig-Crnkovic
doaj   +1 more source

Computer Engineering Education Experiences with RISC-V Architectures—From Computer Architecture to Microcontrollers

open access: yesJournal of Low Power Electronics and Applications, 2022
With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this simple and relevant architecture, and also, these students can explore and design a ...
Peter Jamieson   +7 more
doaj   +1 more source

Accelerating Fully Homomorphic Encryption Through Architecture-Centric Analysis and Optimization

open access: yesIEEE Access, 2021
Homomorphic Encryption (HE) has drawn significant attention as a privacy-preserving approach for cloud computing because it allows computation on encrypted messages called ciphertexts. Among the numerous HE schemes proposed thus far, HE for Arithmetic of
Wonkyung Jung   +8 more
doaj   +1 more source

Project design for computer architecture practical sessions based on field-programmable gate array

open access: yesMokslas: Lietuvos Ateitis, 2021
Field-programmable logic arrays are often used in courses on computer architecture. The student must describe the processor with the external components necessary for its operation in the specified HDL (hardware description language) language according ...
Kęstutis Bartnykas
doaj   +1 more source

A Cellular, Language Directed Computer Architecture [PDF]

open access: yes, 1979
If a VLSI computer architecture is to influence the field of computing in some major way, it must have attractive properties in all important aspects affecting the design, production, and the use of the resulting computers.
Clark, K, Hagen, R, Robinson, PJ
core   +2 more sources

Home - About - Disclaimer - Privacy