Results 21 to 30 of about 1,374,683 (343)

The Future of Cybersecurity in the Age of Quantum Computers

open access: yesFuture Internet, 2022
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj   +1 more source

An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications

open access: yesSensors, 2021
Embedded systems technology is undergoing a phase of transformation owing to the novel advancements in computer architecture and the breakthroughs in machine learning applications.
Taiwo Samuel Ajani   +2 more
doaj   +1 more source

Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment

open access: yesIEEE Access, 2020
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee   +4 more
doaj   +1 more source

A new golden age for computer architecture

open access: yesCommunications of the ACM, 2019
Innovations like domain-specific hardware, enhanced security, open instruction sets, and agile chip development will lead the way.
J. Hennessy, D. Patterson
semanticscholar   +1 more source

A Quantum Computer Architecture using Nonlocal Interactions [PDF]

open access: yes, 2003
Several authors have described the basic requirements essential to build a scalable quantum computer. Because many physical implementation schemes for quantum computing rely on nearest neighbor interactions, there is a hidden quantum communication ...
Brennen, Gavin K.   +2 more
core   +2 more sources

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2021
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj  

Expansible Network-on-Chip Architecture

open access: yesAdvances in Electrical and Computer Engineering, 2018
Interconnection has a great importance to provide a high bandwidth communication among parallel systems. On multi-core context, Network-on-Chip is the default intra-chip interconnection choice, providing low contention and high bandwidth between the ...
PIRES, I. L. P.   +2 more
doaj   +1 more source

Circuit centric quantum architecture design

open access: yesIET Quantum Communication, 2021
With the development in the field of quantum physics, several methods for building a quantum computer have emerged. These differ in qubit technologies, interaction topologies, and noise characteristics.
Utkarsh Azad   +4 more
doaj   +1 more source

Adaptive Granularity Based Last-Level Cache Prefetching Method with eDRAM Prefetch Buffer for Graph Processing Applications

open access: yesApplied Sciences, 2021
The emergence of big data processing and machine learning has triggered the exponential growth of the working set sizes of applications. In addition, several modern applications are memory intensive with irregular memory access patterns.
Sae-Gyeol Choi   +2 more
doaj   +1 more source

A Method for Evaluating and Selecting Suitable Hardware for Deployment of Embedded System on UAVs

open access: yesSensors, 2020
The use of UAVs for remote sensing is increasing. In this paper, we demonstrate a method for evaluating and selecting suitable hardware to be used for deployment of algorithms for UAV-based remote sensing under considerations of Size, Weight, Power, and ...
Nicolas Mandel   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy