Zobrazeno 1 - 10
of 229 868
pro vyhledávání: '"A. A. Hameed"'
Publikováno v:
In Journal of Engineering and Technology Management April-June 2020 56
The growing necessity for enhanced processing capabilities in edge devices with limited resources has led us to develop effective methods for improving high-performance computing (HPC) applications. In this paper, we introduce LASP (Lightweight Autot
Externí odkaz:
http://arxiv.org/abs/2501.01057
Autor:
Padhi, Inkit, Nagireddy, Manish, Cornacchia, Giandomenico, Chaudhury, Subhajit, Pedapati, Tejaswini, Dognin, Pierre, Murugesan, Keerthiram, Miehling, Erik, Cooper, Martín Santillán, Fraser, Kieran, Zizzo, Giulio, Hameed, Muhammad Zaid, Purcell, Mark, Desmond, Michael, Pan, Qian, Ashktorab, Zahra, Vejsbjerg, Inge, Daly, Elizabeth M., Hind, Michael, Geyer, Werner, Rawat, Ambrish, Varshney, Kush R., Sattigeri, Prasanna
We introduce the Granite Guardian models, a suite of safeguards designed to provide risk detection for prompts and responses, enabling safe and responsible use in combination with any large language model (LLM). These models offer comprehensive cover
Externí odkaz:
http://arxiv.org/abs/2412.07724
Existing Hardware Trojans (HT) detection methods face several critical limitations: logic testing struggles with scalability and coverage for large designs, side-channel analysis requires golden reference chips, and formal verification methods suffer
Externí odkaz:
http://arxiv.org/abs/2412.07636
The android operating system is being installed in most of the smart devices. The introduction of intrusions in such operating systems is rising at a tremendous rate. With the introduction of such malicious data streams, the smart devices are being s
Externí odkaz:
http://arxiv.org/abs/2412.03894
Traditionally, inserting realistic Hardware Trojans (HTs) into complex hardware systems has been a time-consuming and manual process, requiring comprehensive knowledge of the design and navigating intricate Hardware Description Language (HDL) codebas
Externí odkaz:
http://arxiv.org/abs/2412.02816
As mobile systems become more advanced, the security of System-on-Chips (SoCs) is increasingly threatened by thermal attacks. This research introduces a new attack method called the Multi-stage Adaptive Thermal Trojan for Efficiency and Resilience De
Externí odkaz:
http://arxiv.org/abs/2412.00226
Autor:
Rogić, L., Somun, N., Griffitt, S., Najev, A., Spaić, M., Hameed, S., Shemerliuk, Y., Aswartham, S., Orlita, M., Alfonsov, A., Pelc, D.
We present the design of a continuous-wave, highly sensitive optical spectrometer for millimeter-wave frequencies between 50 and 1000 GHz. The spectrometer uses photomixing of near-infrared light to generate radiation in a wide frequency range, and t
Externí odkaz:
http://arxiv.org/abs/2411.15910
Reuse distance analysis is a widely recognized method for application characterization that illustrates cache locality. Although there are various techniques to calculate the reuse profile from dynamic memory traces, it is both time and space-consumi
Externí odkaz:
http://arxiv.org/abs/2411.13854
Autor:
Grosnit, Antoine, Maraval, Alexandre, Doran, James, Paolo, Giuseppe, Thomas, Albert, Beevi, Refinath Shahul Hameed Nabeezath, Gonzalez, Jonas, Khandelwal, Khyati, Iacobacci, Ignacio, Benechehab, Abdelhakim, Cherkaoui, Hamza, El-Hili, Youssef Attia, Shao, Kun, Hao, Jianye, Yao, Jun, Kegl, Balazs, Bou-Ammar, Haitham, Wang, Jun
We introduce Agent K v1.0, an end-to-end autonomous data science agent designed to automate, optimise, and generalise across diverse data science tasks. Fully automated, Agent K v1.0 manages the entire data science life cycle by learning from experie
Externí odkaz:
http://arxiv.org/abs/2411.03562