Results 11 to 20 of about 1,373,407 (260)

A Cellular, Language Directed Computer Architecture [PDF]

open access: yes, 1979
If a VLSI computer architecture is to influence the field of computing in some major way, it must have attractive properties in all important aspects affecting the design, production, and the use of the resulting computers.
Clark, K, Hagen, R, Robinson, PJ
core   +2 more sources

Most Resource Efficient Matrix Vector Multiplication on FPGAs

open access: yesIEEE Access, 2023
Fast and resource-efficient inference in artificial neural networks (ANNs) is of utmost importance and drives many new developments in the area of new hardware architectures, e.g., by means of systolic arrays or algorithmic optimization such as pruning ...
Alexander Lehnert   +4 more
doaj   +1 more source

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2021
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj  

Accelerating Fully Homomorphic Encryption Through Architecture-Centric Analysis and Optimization

open access: yesIEEE Access, 2021
Homomorphic Encryption (HE) has drawn significant attention as a privacy-preserving approach for cloud computing because it allows computation on encrypted messages called ciphertexts. Among the numerous HE schemes proposed thus far, HE for Arithmetic of
Wonkyung Jung   +8 more
doaj   +1 more source

Rethinking the Inception Architecture for Computer Vision [PDF]

open access: yes, 2015
Convolutional networks are at the core of most state-of-the-art computer vision solutions for a wide variety of tasks. Since 2014 very deep convolutional networks started to become mainstream, yielding substantial gains in various benchmarks.
Ioffe, Sergey   +4 more
core   +2 more sources

A Method for Evaluating and Selecting Suitable Hardware for Deployment of Embedded System on UAVs

open access: yesSensors, 2020
The use of UAVs for remote sensing is increasing. In this paper, we demonstrate a method for evaluating and selecting suitable hardware to be used for deployment of algorithms for UAV-based remote sensing under considerations of Size, Weight, Power, and ...
Nicolas Mandel   +2 more
doaj   +1 more source

A Quantum Computer Architecture using Nonlocal Interactions [PDF]

open access: yes, 2003
Several authors have described the basic requirements essential to build a scalable quantum computer. Because many physical implementation schemes for quantum computing rely on nearest neighbor interactions, there is a hidden quantum communication ...
Brennen, Gavin K.   +2 more
core   +2 more sources

An Approach to the Construction of a Network Processing Unit

open access: yesМоделирование и анализ информационных систем, 2019
The paper proposes the architecture and basic requirements for a network processor for OpenFlow switches of software-defined networks. An analysis of the architectures of well-known network processors is presented − NP-5 from EZchip (now Mellanox) and ...
Stanislav O. Bezzubtsev   +6 more
doaj   +1 more source

Circuit centric quantum architecture design

open access: yesIET Quantum Communication, 2021
With the development in the field of quantum physics, several methods for building a quantum computer have emerged. These differ in qubit technologies, interaction topologies, and noise characteristics.
Utkarsh Azad   +4 more
doaj   +1 more source

Adaptive Granularity Based Last-Level Cache Prefetching Method with eDRAM Prefetch Buffer for Graph Processing Applications

open access: yesApplied Sciences, 2021
The emergence of big data processing and machine learning has triggered the exponential growth of the working set sizes of applications. In addition, several modern applications are memory intensive with irregular memory access patterns.
Sae-Gyeol Choi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy