Results 101 to 110 of about 3,158,311 (225)

Hardware-hardened Sandbox Enclaves for Trusted Serverless Computing

open access: yesACM Transactions on Architecture and Code Optimization
In cloud-based serverless computing, an application consists of multiple functions provided by mutually distrusting parties. For secure serverless computing, the hardware-based trusted execution environment (TEE) can provide strong isolation among functions.
Joongun Park   +6 more
openaire   +1 more source

A three-dimensional finite element model of an adherent eukaryotic cell

open access: yesEuropean Cells & Materials, 2004
Mechanical stimulation is known to cause alterations in the behaviour of cells adhering to a substrate. The mechanisms by which forces are transduced into biological responses within the cell remain largely unknown.
McGarry J. G., Prendergast P. J.
doaj  

A Radiation-Hardened, Computer for Satellite Applications

open access: yes, 1996
This paper describes high reliability radiation hardened computers built by Sandia for application aboard Department Of Energy (DOE) Satellite programs requiring 32-bit processing. The computers highlight a radiation hardened (1 Mrad(Si)) R3000 executing up to 10 Million Reduced Instruction Set Instructions (RISC) Per Second (MIPS), a dual purpose ...
openaire   +1 more source

Variance-Aware Noisy Training: Hardening DNNs Against Unstable Analog Computations

open access: yes
The disparity between the computational demands of deep learning and the capabilities of compute hardware is expanding drastically. Although deep learning achieves remarkable performance in countless tasks, its escalating requirements for computational power and energy consumption surpass the sustainable limits of even specialized neural processing ...
Xiao Wang   +3 more
openaire   +2 more sources

Different aspects of low-cycle fatigue [PDF]

open access: yes
The experimental and theoretical knowledge in this field is presented. The different relations which correlate the number of cyles to rupture with strain or strain-energy are given.
Bathias, C.
core   +1 more source

Hardening High-Assurance Security Systems with Trusted Computing

open access: yes, 2021
We are living in the time of the digital revolution in which the world we know changes beyond recognition every decade. The positive aspect is that these changes also drive the progress in quality and availability of digital assets crucial for our societies.
openaire   +1 more source

Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems

open access: yesInternational Symposium on Parallel and Distributed Computing, 2008
Serguei A. Mokhov
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy