Results 111 to 120 of about 797,630 (345)
Ultrasensitive Detection of FKBP12 Using a Synthetic Receptor‐Functionalized QCM Nanoplatform
A reusable nanosensor platform for ultralow FKBP12 detection in physiological fluids is presented. Combining a gold‐coated QCM with a custom‐designed receptor in a self‐assembled monolayer, the device achieves picomolar sensitivity and high selectivity.
Martina Tozzetti+8 more
wiley +1 more source
Benchmarking for high-level synthesis [PDF]
This paper discusses issues in benchmarking for synthesis, and suggests techniques for the comparison of benchmark descriptions, the synthesis tools used, as well as the synthesized designs finally generated.
Dutt, Nikil D., Gajski, Daniel D.
core
EffectiveSan: Type and Memory Error Detection using Dynamically Typed C/C++
Low-level programming languages with weak/static type systems, such as C and C++, are vulnerable to errors relating to the misuse of memory at runtime, such as (sub-)object bounds overflows, (re)use-after-free, and type confusion. Such errors account for
Akritidis P.+10 more
core +1 more source
BrainFusion is a low‐code software framework for multimodal brain–computer interface (BCI) and brain–body interaction research. It supports electroencephalography (EEG), functional near‐infrared spectroscopy (fNIRS), electromyography (EMG), and electrocardiography (ECG) integration with standardized preprocessing, feature fusion, and model ...
Wenhao Li+10 more
wiley +1 more source
Active learning of neuron morphology for accurate automated tracing of neurites
Automating the process of neurite tracing from light microscopy stacks of images is essential for large-scale or high-throughput quantitative studies of neural circuits.
Rohan eGala+4 more
doaj +1 more source
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement
Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have been proposed to mitigate attacks that exploit memory errors to hijack the control flow of the
Asokan, N.+6 more
core
On the Theory of Spatial and Temporal Locality [PDF]
This paper studies the theory of caching and temporal and spatial locality. We show the following results: (1) hashing can be used to guarantee that caches with limited associativity behave as well as fully associative cache; (2) temporal locality cannot
Snir, Marc, Yu, Jing
core
Relay: A New IR for Machine Learning Frameworks
Machine learning powers diverse services in industry including search, translation, recommendation systems, and security. The scale and importance of these models require that they be efficient, expressive, and portable across an array of heterogeneous ...
Abadi Martin+7 more
core +1 more source
VOx‐Based Non‐Volatile Radio‐Frequency Switches for Reconfigurable Filter
Vanadium oxide‐based memristor devices achieve high performance for next‐generation non‐volatile memory and RF switches. These devices demonstrate a cutoff frequency of ≈4.5 THz, low insertion loss (<0.46 dB), and high isolation (>20 dB) from 0.1 to 20 GHz with stable operation extended to 67 GHz.
Dabin Seo+6 more
wiley +1 more source
Approximating the Impedance Profile of Multilayer Reference Plane Cut-Out Compensation up to Ka-Band
This paper addresses and solves a problem finding the reference plane impedance compensation impedance profile using a modified logistic function approximation and avoiding both the search for complex fringe capacitance equations, when the reference ...
Vaidotas Barzdenas+2 more
doaj +1 more source