Results 31 to 40 of about 5,737,648 (349)
A Style-Based Generator Architecture for Generative Adversarial Networks [PDF]
We propose an alternative generator architecture for generative adversarial networks, borrowing from style transfer literature. The new architecture leads to an automatically learned, unsupervised separation of high-level attributes (e.g., pose and ...
Tero Karras, S. Laine, Timo Aila
semanticscholar +1 more source
Medical devices (MDs) have been designed for monitoring the parameters of patients in many sectors. Nonetheless, despite being high-performing and reliable, they often turn out to be expensive and intrusive.
Adriano Tramontano +5 more
doaj +1 more source
An Approach to the Construction of a Network Processing Unit
The paper proposes the architecture and basic requirements for a network processor for OpenFlow switches of software-defined networks. An analysis of the architectures of well-known network processors is presented − NP-5 from EZchip (now Mellanox) and ...
Stanislav O. Bezzubtsev +6 more
doaj +1 more source
The Future of Cybersecurity in the Age of Quantum Computers
The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) in a ...
Fazal Raheman
doaj +1 more source
An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications
Embedded systems technology is undergoing a phase of transformation owing to the novel advancements in computer architecture and the breakthroughs in machine learning applications.
Taiwo Samuel Ajani +2 more
doaj +1 more source
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
The verifiable computation paradigm has been studied extensively as a means to verifying the result of outsourced computation. In said scheme, the verifier requests computation from the prover and verifies the result by checking the output and proof ...
Junghee Lee +4 more
doaj +1 more source
A new golden age for computer architecture
Innovations like domain-specific hardware, enhanced security, open instruction sets, and agile chip development will lead the way.
J. Hennessy, D. Patterson
semanticscholar +1 more source
Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj
A Quantum Computer Architecture using Nonlocal Interactions [PDF]
Several authors have described the basic requirements essential to build a scalable quantum computer. Because many physical implementation schemes for quantum computing rely on nearest neighbor interactions, there is a hidden quantum communication ...
Brennen, Gavin K. +2 more
core +2 more sources
Expansible Network-on-Chip Architecture
Interconnection has a great importance to provide a high bandwidth communication among parallel systems. On multi-core context, Network-on-Chip is the default intra-chip interconnection choice, providing low contention and high bandwidth between the ...
PIRES, I. L. P. +2 more
doaj +1 more source

