Results 31 to 40 of about 4,761,487 (378)

A survey on hardware-based malware detection approaches [PDF]

open access: yesIEEE ACCESS 2024, 2023
This paper delves into the dynamic landscape of computer security, where malware poses a paramount threat. Our focus is a riveting exploration of the recent and promising hardware-based malware detection approaches. Leveraging hardware performance counters and machine learning prowess, hardware-based malware detection approaches bring forth compelling ...
arxiv   +1 more source

Hardware Information Flow Tracking

open access: yesACM Computing Surveys, 2021
Information flow tracking (IFT) is a fundamental computer security technique used to understand how information moves through a computing system. Hardware IFT techniques specifically target security vulnerabilities related to the design, verification ...
Wei Hu   +2 more
semanticscholar   +1 more source

Increasing sensor reliability through confidence attribution

open access: yesJournal of the Brazilian Computer Society, 2019
The reliability of wireless sensor networks (WSN) is getting increasing importance as this kind of networks are becoming the communication base for many cyber-physical systems (CPS).
Roberto M. Scheffel   +1 more
doaj   +1 more source

Programming gate-based hardware quantum computers for music [PDF]

open access: yesMuzikologija, 2018
There have been significant attempts previously to use the equations of quantum mechanics for generating sound, and to sonify simulated quantum processes. For new forms of computation to be utilized in computer music, eventually hardware must be
Kirke Alexis
doaj   +1 more source

An adaptive variational algorithm for exact molecular simulations on a quantum computer [PDF]

open access: yesNature Communications, 2018
Quantum simulation of chemical systems is one of the most promising near-term applications of quantum computers. The variational quantum eigensolver, a leading algorithm for molecular simulations on quantum hardware, has a serious limitation in that it ...
Harper R. Grimsley   +3 more
semanticscholar   +1 more source

Applying RIS-Based Communication for Collaborative Computing in a Swarm of Drones

open access: yesIEEE Access, 2023
A swarm of autonomous and heterogeneous drones has many benefits in various scenarios e.g. search and rescue, disaster management, agriculture, delivery and logistics, mapping and surveying, environmental monitoring, etc.
Dadmehr Rahbari   +3 more
doaj   +1 more source

Status of the CP-PACS Project [PDF]

open access: yes, 1996
The CP-PACS computer with a peak speed of 300 Gflops was completed in March 1996 and has started to operate. We describe the final specification and the hardware implementation of the CP-PACS computer, and its performance for QCD codes.
Iwasaki, Ukawa, Y. Iwasaki
core   +2 more sources

EH-DNAS: End-to-End Hardware-aware Differentiable Neural Architecture Search [PDF]

open access: yesarXiv, 2021
In hardware-aware Differentiable Neural Architecture Search (DNAS), it is challenging to compute gradients of hardware metrics to perform architecture search. Existing works rely on linear approximations with limited support to customized hardware accelerators. In this work, we propose End-to-end Hardware-aware DNAS (EH-DNAS), a seamless integration of
arxiv  

3D Visualizations in Learning: An Evaluation of an AR+Core Application for Computer Hardware Education using the Hedonic Motivation System Adoption Model

open access: yesTEM Journal
This study delineated the development of an augmented reality (AR+Core) mobile application to enhance computer hardware education. By offering 3D visualizations of computer internals, the application enables students to immerse in hardware-related ...
Agariadne Dwinggo Samala   +9 more
semanticscholar   +1 more source

Stochastic Analysis of a Computer System with Unit Wise Cold Standby Redundancy and Failure of Service Facility [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2020
Here, we analyze stochastically a computer system by taking one more similar unit (called computer system) in cold standby redundancy. The computer system consists of hardware and software components together.
R. K. Yadav, S. C. Malik
doaj   +1 more source

Home - About - Disclaimer - Privacy