Results 21 to 30 of about 5,552,920 (364)

The Future of Cybersecurity in the Age of Quantum Computers

open access: yesFuture Internet, 2022
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj   +1 more source

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2021
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj  

Heart rate estimation from ballistocardiogram signals processing via low-cost telemedicine architectures: a comparative performance evaluation

open access: yesFrontiers in Digital Health, 2023
Medical devices (MDs) have been designed for monitoring the parameters of patients in many sectors. Nonetheless, despite being high-performing and reliable, they often turn out to be expensive and intrusive.
Adriano Tramontano   +5 more
doaj   +1 more source

A Style-Based Generator Architecture for Generative Adversarial Networks [PDF]

open access: yesComputer Vision and Pattern Recognition, 2018
We propose an alternative generator architecture for generative adversarial networks, borrowing from style transfer literature. The new architecture leads to an automatically learned, unsupervised separation of high-level attributes (e.g., pose and ...
Tero Karras, S. Laine, Timo Aila
semanticscholar   +1 more source

A Cellular, Language Directed Computer Architecture [PDF]

open access: yes, 1979
If a VLSI computer architecture is to influence the field of computing in some major way, it must have attractive properties in all important aspects affecting the design, production, and the use of the resulting computers.
Clark, K, Hagen, R, Robinson, PJ
core   +2 more sources

Introduction to the Special Issue on Embedded Systems for Computer Vision [PDF]

open access: yesLeibniz Transactions on Embedded Systems, 2022
We provide a broad overview of some of the current research directions at the intersection of embedded systems and computer vision, in addition to introducing the papers appearing in this special issue.
Chakraborty, Samarjit, Rao, Qing
doaj   +1 more source

A Method for Evaluating and Selecting Suitable Hardware for Deployment of Embedded System on UAVs

open access: yesSensors, 2020
The use of UAVs for remote sensing is increasing. In this paper, we demonstrate a method for evaluating and selecting suitable hardware to be used for deployment of algorithms for UAV-based remote sensing under considerations of Size, Weight, Power, and ...
Nicolas Mandel   +2 more
doaj   +1 more source

A new golden age for computer architecture

open access: yesCommunications of the ACM, 2019
Innovations like domain-specific hardware, enhanced security, open instruction sets, and agile chip development will lead the way.
J. Hennessy, D. Patterson
semanticscholar   +1 more source

Expansible Network-on-Chip Architecture

open access: yesAdvances in Electrical and Computer Engineering, 2018
Interconnection has a great importance to provide a high bandwidth communication among parallel systems. On multi-core context, Network-on-Chip is the default intra-chip interconnection choice, providing low contention and high bandwidth between the ...
PIRES, I. L. P.   +2 more
doaj   +1 more source

An Architecture Combining Blockchain, Docker and Cloud Storage for Improving Digital Processes in Cloud Manufacturing

open access: yesIEEE Access, 2022
The Blockchain has been given great attention in recent literature among emerging technologies in software architectures. More specifically, when verifiable transactions between untrusted parties are concerned in a safe and reliable environment, its ...
Gaetano Volpe   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy