Results 51 to 60 of about 4,761,487 (378)
الطرق المستخدمة في شبكات الحاسبات الالكترونية
الطرق المستخدمة في شبكات الحاسبات ...
كامل عجينة
doaj +1 more source
Fuzzerfly Effect: Hardware Fuzzing for Memory Safety [PDF]
Hardware-level memory vulnerabilities severely threaten computing systems. However, hardware patching is inefficient or difficult postfabrication. We investigate the effectiveness of hardware fuzzing in detecting hardware memory vulnerabilities and highlight challenges and potential future research directions to enhance hardware fuzzing for memory ...
arxiv +1 more source
CollComm: Enabling Efficient Collective Quantum Communication Based on EPR buffering [PDF]
The noisy and lengthy nature of quantum communication hinders the development of distributed quantum computing. The inefficient design of existing compilers for distributed quantum computing worsens the situation. Previous compilation frameworks couple communication hardware with the implementation of expensive remote gates.
arxiv
Abstract Current radiotherapy practices rely on manual contouring of CT scans, which is time‐consuming, prone to variability, and requires highly trained experts. There is a need for more efficient and consistent contouring methods. This study evaluated the performance of the Varian Ethos AI auto‐contouring tool to assess its potential integration into
Robert N. Finnegan+6 more
wiley +1 more source
التطور في مجال الحاسبات الدقيقة وتطورها
التطور في مجال الحاسبات الدقيقة ...
زيد علي محمد الخليل
doaj +1 more source
Abstract Background The use of deep learning‐based auto‐contouring algorithms in various treatment planning services is increasingly common. There is a notable deficit of commercially or publicly available models trained on large or diverse datasets containing high‐dose‐rate (HDR) brachytherapy treatment scans, leading to poor performance on images ...
Andrew J. Krupien+8 more
wiley +1 more source
معمارية جديدة وعلاقتها باجهزة الحاسبة
معمارية جديدة وعلاقتها باجهزة ...
زيد علي محمد الخليل
doaj +1 more source
Cycle-Accurate Evaluation of Software-Hardware Co-Design of Decimal Computation in RISC-V Ecosystem [PDF]
Software-hardware co-design solutions for decimal computation can provide several Pareto points to development of embedded systems in terms of hardware cost and performance. This paper demonstrates how to accurately evaluate such co-design solutions using RISC-V ecosystem. In a software-hardware co-design solution, a part of solution requires dedicated
arxiv
DFSynthesizer: Dataflow-based Synthesis of Spiking Neural Networks to Neuromorphic Hardware [PDF]
Spiking Neural Networks (SNN) are an emerging computation model, which uses event-driven activation and bio-inspired learning algorithms. SNN-based machine-learning programs are typically executed on tile- based neuromorphic hardware platforms, where each tile consists of a computation unit called crossbar, which maps neurons and synapses of the ...
arxiv
Abstract Purpose Volumetric‐modulated arc therapy (VMAT) treatment planning allows a compromise between a sufficient coverage of the planning target volume (PTV) and a simultaneous sparing of organs‐at‐risk (OARs). Particularly in the case of lung tumors, deciding whether it is possible or worth spending more time on further improvements of a treatment
Johann Brand+4 more
wiley +1 more source