Results 91 to 100 of about 165,505 (261)

Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC [PDF]

open access: yesarXiv, 2023
Processing sensitive data and deploying well-designed Intellectual Property (IP) cores on remote Field Programmable Gate Array (FPGA) are prone to private data leakage and IP theft. One effective solution is constructing Trusted Execution Environment (TEE) on FPGA-SoCs (FPGA System on Chips).
arxiv  

Passive Transmissive Reconfigurable Intelligent Surface

open access: yesElectron, Volume 3, Issue 2, May 2025.
Reconfigurable intelligent surfaces (RISs) typically rely on the use of massive active elements. In this paper, a transmissive RIS consisting of two passive metasurfaces is proposed. By controlling the displacement of the metasurface, the beam direction can be steered arbitrarily.
Xiangming Wu   +4 more
wiley   +1 more source

A VHDL Model for Implementation of MD5 Hash Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2013
With the increase of the amount of data and users in the information systems, the requirement of data integrity is needed to be improved as well, so the work has become necessary independently.
Mohammed A. Noaman
doaj   +1 more source

Pentimento: Data Remanence in Cloud FPGAs [PDF]

open access: yesarXiv, 2023
Cloud FPGAs strike an alluring balance between computational efficiency, energy efficiency, and cost. It is the flexibility of the FPGA architecture that enables these benefits, but that very same flexibility that exposes new security vulnerabilities. We show that a remote attacker can recover "FPGA pentimenti" - long-removed secret data belonging to a
arxiv  

Design Neural Wireless Sensor Network Using FPGA [PDF]

open access: yesEngineering and Technology Journal, 2012
Wireless sensor networks(WSN) are an exiting emerging technology that scientists believe to become a part of every day life in the next few years. However, at this time many issues in wireless sensor networks remain unresolved.
Ban M. Khammas
doaj   +1 more source

Coordination Effect of Oligopolists' Multimarket Contact

open access: yesInternational Studies of Economics, EarlyView.
ABSTRACT In this article, we examine the coordination effect of oligopolists' multimarket contact with asymmetric cost. We extend a model of infinitely repeated multimarket contact games with “symmetric advantage” in the seminal paper of Bernheim and Whinston (The RAND Journal of Economics 1990; 21(1): 1–26).
Zuo Yu, Tianyu Luo
wiley   +1 more source

FPGAs in Industrial Control Applications [PDF]

open access: yesIEEE Transactions on Industrial Informatics, 2011
The aim of this paper is to review the state-of-the-art of Field Programmable Gate Array (FPGA) technologies and their contribution to industrial control applications. Authors start by addressing various research fields which can exploit the advantages of FPGAs.
Monmasson, Eric   +5 more
openaire   +6 more sources

Fluorescence Lifetime Imaging Techniques—A Review on Principles, Applications and Clinical Relevance

open access: yesJournal of Biophotonics, EarlyView.
This article gives an overview of the most frequently used fluorescence‐lifetime imaging (FLIM) techniques, their capabilities and typical applications in biology and clinical studies. ABSTRACT This article gives an overview of the most frequently used fluorescence‐lifetime imaging (FLIM) techniques, their capabilities, and typical applications ...
V. I. Shcheslavskiy   +5 more
wiley   +1 more source

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms [PDF]

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack ...
Zane Weissman   +5 more
semanticscholar   +1 more source

BDLUT: Blind image denoising with hardware‐optimized look‐up tables

open access: yesJournal of the Society for Information Display, EarlyView.
BDLUT(‐D) is a novel blind denoising method combining optimized lookup tables (LUTs) with hardware‐centric design. While BDLUT describes the LUT‐based network architecture, BDLUT‐D represents BDLUT trained with a specialized noise degradation model. Designed for edge deployment, BDLUT(‐D) eliminates neural processing units (NPUs) and functions as a ...
Boyu Li   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy