Zobrazeno 1 - 10
of 8 493
pro vyhledávání: '"Joshua, H."'
Modern cryptography, such as Rivest Shamir Adleman (RSA) and Secure Hash Algorithm (SHA), has been designed by humans based on our understanding of cryptographic methods. Neural Network (NN) based cryptography is being investigated due to its ability
Externí odkaz:
http://arxiv.org/abs/2411.10287
We present a theoretical investigation into the dynamics of a viscous gravity current subjected to spatially-finite lubrication (i.e., a `slippery patch'). The work is motivated by grounded ice sheets flowing across patches of basal meltwater which r
Externí odkaz:
http://arxiv.org/abs/2407.20565
Autor:
Davis, Joshua H., Sivaraman, Pranav, Kitson, Joy, Parasyris, Konstantinos, Menon, Harshitha, Minn, Isaac, Georgakoudis, Giorgis, Bhatele, Abhinav
Portability is critical to ensuring high productivity in developing and maintaining scientific software as the diversity in on-node hardware architectures increases. While several programming models provide portability for diverse GPU platforms, they
Externí odkaz:
http://arxiv.org/abs/2402.08950
Publikováno v:
The 33rd International Symposium on High-Performance Parallel and Distributed Computing (HPDC '24), June 3-7, 2024, Pisa, Italy. ACM, New York, NY, USA, 14 pages
Large language models are increasingly becoming a popular tool for software development. Their ability to model and generate source code has been demonstrated in a variety of contexts, including code completion, summarization, translation, and lookup
Externí odkaz:
http://arxiv.org/abs/2401.12554
Autor:
Jia Wang, Chaojiang Zhang, Joshua H. Marks, Mikhail M. Evseev, Oleg V. Kuznetsov, Ivan O. Antonov, Ralf I. Kaiser
Publikováno v:
Nature Communications, Vol 15, Iss 1, Pp 1-11 (2024)
Abstract Aldehydes are ubiquitous in star-forming regions and carbonaceous chondrites, serving as essential intermediates in metabolic pathways and molecular mass growth processes to vital biomolecules necessary for the origins of life. However, thei
Externí odkaz:
https://doaj.org/article/2822d425c77b46b89caa7473142e8cd7
Autor:
Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, Donald R. Reising, T. Daniel Loveless
Publikováno v:
Discover Internet of Things, Vol 4, Iss 1, Pp 1-21 (2024)
Abstract Specific Emitter Identification (SEI) has been put forward as an Internet of Things (IoT) Physical Layer Security (PLS) approach for its abilities to detect, characterize, and identify wireless emitters by exploiting distinct, inherent, and
Externí odkaz:
https://doaj.org/article/28d2c04a771a482d99aa466d2276fd63
As power quality becomes a higher priority in the electric utility industry, the amount of disturbance event data continues to grow. Utilities do not have the required personnel to analyze each event by hand. This work presents an automated approach
Externí odkaz:
http://arxiv.org/abs/2309.04361
Autor:
Tyler, Joshua H., Fadul, Mohamed K. M., Hilling, Matthew R., Reising, Donald R., Loveless, T. Daniel
Specific Emitter Identification (SEI) detects, characterizes, and identifies emitters by exploiting distinct, inherent, and unintentional features in their transmitted signals. Since its introduction, a significant amount of work has been conducted;
Externí odkaz:
http://arxiv.org/abs/2308.03579