Zobrazeno 1 - 10
of 19
pro vyhledávání: '"James Shey"'
Publikováno v:
Symmetry, Vol 16, Iss 1, p 91 (2024)
Transfer learning has proven to be a valuable technique for deploying machine learning models on edge devices and embedded systems. By leveraging pre-trained models and fine-tuning them on specific tasks, practitioners can effectively adapt existing
Externí odkaz:
https://doaj.org/article/e9c91aafd10747079e340511c4441e80
Autor:
Christian DeLozier, James Shey
Publikováno v:
International Journal of Serious Games, Vol 10, Iss 2 (2023)
Enabling programmers to write correct and efficient parallel code remains an important challenge, and the prevalence of on-chip accelerators exacerbates this challenge. Novice programmers, especially those in disciplines outside of Computer Science a
Externí odkaz:
https://doaj.org/article/2e8c7d83e0b94a5d960dd095cc7d0846
Autor:
T. Owens Walker, Justin A. Blanco, Ryan Rakvic, Ann Vanleer, Dane Brown, James Shey, Gregory L. Sinsley, Hau T. Ngo, Robert W. Ives
Publikováno v:
IEEE Access, Vol 8, Pp 31869-31881 (2020)
Solid state drives (SSDs) are coming under increased scrutiny as their popularity continues to grow. SSDs differ from their hard disk drive predecessors because they include an onboard layer of firmware to perform required maintenance tasks related t
Externí odkaz:
https://doaj.org/article/a88c79ebafcf4c94a8b31d67eca3103a
Publikováno v:
2022 56th Asilomar Conference on Signals, Systems, and Computers.
Publikováno v:
2022 International Conference on Electrical, Computer and Energy Technologies (ICECET).
Autor:
James Shey, Hau Ngo, Ryan N. Rakvic, Gregory L. Sinsley, Ann C. Vanleer, Dane Brown, Justin A. Blanco, Robert W. Ives, T. Owens Walker
Publikováno v:
IEEE Access, Vol 8, Pp 31869-31881 (2020)
Solid state drives (SSDs) are coming under increased scrutiny as their popularity continues to grow. SSDs differ from their hard disk drive predecessors because they include an onboard layer of firmware to perform required maintenance tasks related t
Publikováno v:
Journal of Hardware and Systems Security. 3:426-439
With the global spanning of integrated circuit (IC) and electronic device supply chains, the ability of an untrusted foundry to alter a design for intellectual property (IP)/IC piracy increases. To tackle this threat, this paper proposes a design-bas
Autor:
Thomas W. Tedesso, Hau Ngo, Ryan N. Rakvic, Owens Walker, Justin A. Blanco, Kevin D. Fairbanks, James Shey
Publikováno v:
IEEE Transactions on Information Forensics and Security. 14:1296-1306
Solid-state drives (SSDs) are pervasive in modern computing and have supplanted hard disk drives in many applications. Substantial changes in architecture have brought about not only improvements in speed and energy usage but also new security concer
Publikováno v:
2010 Annual Conference & Exposition Proceedings.
Publikováno v:
CF
Many applications make use of the edge devices in wireless sensor networks (WSNs), including video surveillance, traffic monitoring and enforcement, personal and health care, gaming, habitat monitoring, and industrial process control. However, these