Results 41 to 50 of about 336,808 (204)

Event Stream-Based Process Discovery using Abstract Representations [PDF]

open access: yes, 2017
The aim of process discovery, originating from the area of process mining, is to discover a process model based on business process execution data. A majority of process discovery techniques relies on an event log as an input.
van der Aalst, Wil M. P.   +2 more
core   +3 more sources

A Compact and Scalable Hardware/Software Co-design of SIKE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We present efficient and compact hardware/software co-design implementations of the Supersingular Isogeny Key Encapsulation (SIKE) protocol on field-programmable gate arrays (FPGAs).
Pedro Maat C. Massolino   +3 more
doaj   +1 more source

Ancestral inference from haplotypes and mutations

open access: yes, 2018
We consider inference about the history of a sample of DNA sequences, conditional upon the haplotype counts and the number of segregating sites observed at the present time.
Griffiths, Robert C., Tavaré, Simon
core   +1 more source

Iterative Blind Deconvolution Algorithm for Deblurring a Single PSP/TSP Image of Rotating Surfaces

open access: yesSensors, 2018
Imaging of pressure-sensitive paint (PSP) for pressure measurement on moving surfaces is problematic due to the movement of the object within the finite exposure time of the imager, resulting in the blurring of the blade edges.
Anshuman Pandey, James W. Gregory
doaj   +1 more source

An Online Unsupervised Structural Plasticity Algorithm for Spiking Neural Networks

open access: yes, 2015
In this article, we propose a novel Winner-Take-All (WTA) architecture employing neurons with nonlinear dendrites and an online unsupervised structural plasticity rule for training it.
Basu, Arindam, Roy, Subhrajit
core   +1 more source

Evaluating Architecture Implementation Alternatives based on Adaptibility Concerns [PDF]

open access: yes, 1999
Software is rarely designed for ultimate adaptability, performance or reusability but rather it is a compromise of multiple considerations. Even for a simple architecture specification, one may identify many alternative implementations.
Aksit, Mehmet, Tekinerdogan, Bedir
core   +2 more sources

MYCN Amplification in RB1‐Inactivated Retinoblastoma: Association With High‐Risk Features

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background MYCN amplification occurs in a subset of retinoblastoma cases, both with and without RB1 inactivation. It has been suggested that retinoblastomas with MYCN amplification represent a distinct entity with more aggressive clinical behavior.
Kyriaki Papaioannou   +9 more
wiley   +1 more source

Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
We present the first hardware implementations of Diffie-Hellman key exchange based on the Kummer surface of Gaudry and Schost’s genus-2 curve targeting a 128-bit security level.
Philipp Koppermann   +3 more
doaj   +1 more source

Efficient Neural Network Implementations on Parallel Embedded Platforms Applied to Real-Time Torque-Vectoring Optimization Using Predictions for Multi-Motor Electric Vehicles [PDF]

open access: yes, 2019
The combination of machine learning and heterogeneous embedded platforms enables new potential for developing sophisticated control concepts which are applicable to the field of vehicle dynamics and ADAS.
Cosco, Francesco   +4 more
core   +2 more sources

Towards Efficient Verification of Constant-Time Cryptographic Implementations

open access: yesProceedings of the ACM on Software Engineering
Timing side-channel attacks exploit secret-dependent execution time to fully or partially recover secrets of cryptographic implementations, posing a severe threat to software security. Constant-time programming discipline is an effective software-based countermeasure against timing side-channel attacks, but developing constant-time implementations ...
Luwei Cai, Fu Song, Taolue Chen
openaire   +2 more sources

Home - About - Disclaimer - Privacy