Zobrazeno 1 - 10
of 1 571
pro vyhledávání: '"Memory address"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Alexandria Engineering Journal, Vol 60, Iss 1, Pp 1489-1497 (2021)
The extensive networking of devices and the large amount of data generated from the Internet of Things (IoT) has brought security issues to the attention of the researcher. Java is the most common platform for embedded applications such as IoT, Wirel
Externí odkaz:
https://doaj.org/article/697ef622e29641a7a1bd1e7f3ca7af65
Autor:
Gopal Raut, Narendra Singh Dhakad, Neha Gupta, Anton Biasizzo, Gregor Papa, Santosh Kumar Vishvakarma
Publikováno v:
Neurocomputing
Neurocomputing, 2021.
Neurocomputing, 2021.
Despite many decades of research on high-performance Deep Neural Network (DNN) accelerators, their massive computational demand still requires resource-efficient, optimized and parallel architecture for computational acceleration. Contemporary hardwa
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 29:2172-2185
This investigation proposes a computing-in-memory (CIM) design to circumvent the von Neumann bottleneck which causes limited computation throughput for effective artificial intelligence (AI) applications. The proposed CIM performs multiple operations
Publikováno v:
ACM Transactions on Embedded Computing Systems. 20:1-20
Efficiently accessing remote file data remains a challenging problem for data processing systems. Development of technologies in non-volatile dual in-line memory modules (NVDIMMs), in-memory file systems, and RDMA networks provide new opportunities t
Publikováno v:
IEEE Computer Architecture Letters. 20:138-141
Cross-core conflict-based timing attacks like Prime+Probe at the shared last-level cache (LLC) are practical and can cause information leakage. Cache address randomization is one of the techniques that claim to mitigate these attacks. CEASER, CEASER-
Publikováno v:
IEEE Micro. 41:95-101
Fault-tolerant quantum computing is required to execute many of the most promising quantum applications. In recent years, numerous error correcting codes, such as the surface code, have emerged which are well suited for current and future limited con
Publikováno v:
IEEE Internet of Things Journal. 8:5904-5913
With the development of the cloud-based Internet of Things (IoT), people and things can request services, access data, or control actuators located thousands of miles away. The entity authentication of the remotely accessed devices is an essential pa
Publikováno v:
IEEE Access, Vol 9, Pp 140349-140357 (2021)
Conflict-free addressing (CFA) techniques are necessary for Fast Fourier Transform (FFT) hardware. For low radices, well-proven XOR-based addressing architectures are available in the literature. Applications such as wireless communication use higher
Publikováno v:
Future Generation Computer Systems. 112:136-147
In this work, we present a runtime approach, called MeltdownDetector, for detecting, isolating, and preventing ongoing Meltdown attacks that operate by causing segmentation faults. Meltdown exploits a hardware vulnerability that allows a malicious pr