Results 71 to 80 of about 5,737,648 (349)

Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data

open access: yesIEEE Access, 2022
An increasing number of embedded systems include dedicated neural hardware. To benefit from this specialized hardware, deep learning techniques to discover malware on embedded systems are needed. This effort evaluated candidate machine learning detection
Daniel F. Koranek   +3 more
doaj   +1 more source

Computer Analysis of Architecture Using Automatic Image Understanding

open access: yes, 2019
In the past few years, computer vision and pattern recognition systems have been becoming increasingly more powerful, expanding the range of automatic tasks enabled by machine vision.
Li, Yuan, Shamir, Lior, Wei, Fan
core   +1 more source

The Caenorhabditis elegans DPF‐3 and human DPP4 have tripeptidyl peptidase activity

open access: yesFEBS Letters, EarlyView.
The dipeptidyl peptidase IV (DPPIV) family comprises serine proteases classically defined by their ability to remove dipeptides from the N‐termini of substrates, a feature that gave the family its name. Here, we report the discovery of a previously unrecognized tripeptidyl peptidase activity in DPPIV family members from two different species.
Aditya Trivedi, Rajani Kanth Gudipati
wiley   +1 more source

An integrated taxonomy of standard indicators for ranking and selecting supercomputers

open access: yesIET Computers & Digital Techniques, 2023
Due to the ever‐increasing computing requirements of modern applications, supercomputers are at the centre of attraction as a platform for high‐performance computing.
Davood Maleki   +2 more
doaj   +1 more source

Energy-Efficient Shared Cache Using Way Prediction Based on Way Access Dominance Detection

open access: yesIEEE Access, 2021
To meet the performance demands of chip multiprocessors, chip designers have increased the capacity and hierarchy of cache memories. Accordingly, a shared lower-level cache reduces conflict misses by adopting a multi-way set-associative structure with ...
Yun-Seok Oh, Eui-Young Chung
doaj   +1 more source

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

A Detailed Study of SOT-MRAM as an Alternative to DRAM Primary Memory in Multi-Core Environment

open access: yesIEEE Access
As the current primary memory technology is reaching its limits, it is essential to explore alternative memory technologies to accommodate modern applications and use cases.
H. D. Kallinatha   +2 more
doaj   +1 more source

Techniques for improving reliability of computers [PDF]

open access: yes, 1972
Modular design techniques improve methods of error detection, diagnosis, and recovery. Theoretical computer (MARCS (Modular Architecture for Reliable Computer Systems)) study deals with postulated and modeled technology indigenous to 1975-1980.
Bouricius, W. G.   +5 more
core   +1 more source

Distributed PC Based Routers: Bottleneck Analysis and Architecture Proposal [PDF]

open access: yes, 2008
Recent research in the different functional areas of modern routers have made proposals that can greatly increase the efficiency of these machines. Most of these proposals can be implemented quickly and often efficiently in software.
Bianco, Andrea   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy