Results 11 to 20 of about 190,604 (199)
Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman+3 more
doaj +1 more source
A Cross-Prefetcher Schedule Optimization Methodology
Prefetching offers the potential to significantly improve performance by speculatively loading application data so that it is available before it is needed. By their very nature, prefetching techniques are application behavior dependant.
Razvan Nitu+2 more
doaj +1 more source
Medical devices (MDs) have been designed for monitoring the parameters of patients in many sectors. Nonetheless, despite being high-performing and reliable, they often turn out to be expensive and intrusive.
Adriano Tramontano+5 more
doaj +1 more source
Modeling Computing Devices and Processes by Information Operators
The concept of operator is exceedingly important in many areas as a tool of theoretical studies and practical applications. Here, we introduce the operator theory of computing, opening new opportunities for the exploration of computing devices, networks,
Mark Burgin, Gordana Dodig-Crnkovic
doaj +1 more source
Verification of serialising instructions for security against transient execution attacks
Transient execution attacks such as Spectre and Meltdown exploit speculative execution in modern microprocessors to leak information via cache side‐channels.
Kushal K. Ponugoti+2 more
doaj +1 more source
The Future of Cybersecurity in the Age of Quantum Computers
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj +1 more source
An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications
Embedded systems technology is undergoing a phase of transformation owing to the novel advancements in computer architecture and the breakthroughs in machine learning applications.
Taiwo Samuel Ajani+2 more
doaj +1 more source
The Ensembl Computing Architecture [PDF]
Ensembl is a software project to automatically annotate large eukaryotic genomes and release them freely into the public domain. The project currently automatically annotates 10 complete genomes. This makes very large demands on compute resources, due to the vast number of sequence comparisons that need to be executed.
Tim J.R. Cutts+3 more
openaire +2 more sources
With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this simple and relevant architecture, and also, these students can explore and design a ...
Peter Jamieson+7 more
doaj +1 more source
Project design for computer architecture practical sessions based on field-programmable gate array
Field-programmable logic arrays are often used in courses on computer architecture. The student must describe the processor with the external components necessary for its operation in the specified HDL (hardware description language) language according ...
Kęstutis Bartnykas
doaj +1 more source