Results 1 to 10 of about 45,197 (322)

Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection [PDF]

open access: goldBig Data and Cognitive Computing, 2021
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual ...
Huseyn Huseynov   +2 more
doaj   +2 more sources

Computed Tomography Beam Hardening Correction Based on Non-linear Segmentation [PDF]

open access: diamondInternational Journal Bioautomation, 2019
This paper aims to eliminate the hardening artifacts in computed tomography (CT) images caused by the polychromatic X-ray spectrum. To this end, a polynomial fitting correction method using non-liner segmentation method was developed through projection ...
Xiaoke Zhang   +4 more
doaj   +2 more sources

Computed tomographic beam-hardening artefacts: mathematical characterization and analysis [PDF]

open access: bronzePhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2015
This paper presents a mathematical characterization and analysis of beam-hardening artefacts in X-ray computed tomography (CT). In the field of dental and medical radiography, metal artefact reduction in CT is becoming increasingly important as artificial prostheses and metallic implants become more widespread in ageing populations. Metal artefacts are
Hyoung Suk, Park   +2 more
openaire   +5 more sources

Security Assessment and Hardening of Fog Computing Systems [PDF]

open access: green2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW), 2023
In recent years, there has been a shift in computing architectures, moving away from centralized cloud computing towards decentralized edge and fog computing. This shift is driven by factors such as the increasing volume of data generated at the edge, the growing demand for real-time processing and low-latency applications, and the need for improved ...
Carmine Cesarano
openaire   +3 more sources

CMOS‐Compatible HfOx‐Based Radiation Hardening Component for Neuromorphic Computing Applications [PDF]

open access: goldAdvanced Electronic Materials
HfOx‐based resistive random‐access‐memory (ReRAM) devices (TiN/Ti/HfOx/RuOx/TiN) are fabricated by CMOS‐compatible materials (ruthenium (Ru)) and lithography‐lite process, potentially enabling a maskless, etching‐free process that can be implemented in ...
Yao‐Feng Chang   +3 more
doaj   +2 more sources

Fault-Tolerant Computing with Heterogeneous Hardening Modes [PDF]

open access: diamond, 2020
AbstractFault-tolerance using (full-scale) redundancy-based techniques has been employed to detect and correct reliability errors (i.e., soft errors), but they pose significant area and power overhead. On the other hand, due to the masking and the error tolerance properties at different system layers and of different applications, respectively ...
Florian Kriebel   +4 more
openaire   +2 more sources

Hardware-hardened Sandbox Enclaves for Trusted Serverless Computing [PDF]

open access: diamondACM Transactions on Architecture and Code Optimization, 2023
In cloud-based serverless computing, an application consists of multiple functions provided by mutually distrusting parties. For secure serverless computing, the hardware-based trusted execution environment (TEE) can provide strong isolation among functions.
Joongun Park   +6 more
openaire   +2 more sources

Docker container hardening method based on trusted computing

open access: diamondJournal of Physics: Conference Series, 2020
Abstract In view of the incomplete isolation of docker, the image file is easy to be tampered with, and the problem of insecure container operation. Based on the analysis of the existing isolation mechanism and security enhancement technology of docker container, this article uses trusted computing technologies such as cryptographic ...
Yuang Shen, Xuejun Yu
openaire   +2 more sources

Magnetic‐Driven Viscous Mechanisms in Ultra‐Soft Magnetorheological Elastomers Offer History‐Dependent Actuation with Reprogrammability Options [PDF]

open access: yesAdvanced Science
This work elucidates an important open question in the field of mechanically soft magnetorheological elastomers (MREs): how microstructural rearrangements during magnetic actuation modulate their viscoelastic behavior. Experimental assays are provided on
Ernesto Gonzalez‐Saiz   +4 more
doaj   +2 more sources

LHC Computing – the First 3 Decades [PDF]

open access: yesEPJ Web of Conferences, 2021
Computing for the Large Hadron Collider (LHC) at CERN arguably started shortly after the commencement of data taking at the previous machine – LEP – some would argue it was even before.
Sheirs Jamie
doaj   +1 more source

Home - About - Disclaimer - Privacy