Zobrazeno 1 - 10
of 11 632
pro vyhledávání: '"Merchant P"'
Autor:
Dahiphale, Devendra, Madiraju, Naveen, Lin, Justin, Karve, Rutvik, Agrawal, Monu, Modwal, Anant, Balakrishnan, Ramanan, Shah, Shanay, Kaushal, Govind, Mandawat, Priya, Hariramani, Prakash, Merchant, Arif
Digital payment systems have revolutionized financial transactions, offering unparalleled convenience and accessibility to users worldwide. However, the increasing popularity of these platforms has also attracted malicious actors seeking to exploit t
Externí odkaz:
http://arxiv.org/abs/2410.19845
Autor:
Zakeri, Abdollah, Fawakherji, Mulham, Kang, Jiming, Koirala, Bikram, Balan, Venkatesh, Zhu, Weihang, Benhaddou, Driss, Merchant, Fatima A.
Automating agricultural processes holds significant promise for enhancing efficiency and sustainability in various farming practices. This paper contributes to the automation of agricultural processes by providing a dedicated mushroom detection datas
Externí odkaz:
http://arxiv.org/abs/2407.11275
Navigating unfamiliar environments presents significant challenges for blind and low-vision (BLV) individuals. In this work, we construct a dataset of images and goals across different scenarios such as searching through kitchens or navigating outdoo
Externí odkaz:
http://arxiv.org/abs/2407.08219
Resistive random-access memory (RRAM) is gaining popularity due to its ability to offer computing within the memory and its non-volatile nature. The unique properties of RRAM, such as binary switching, multi-state switching, and device variations, ca
Externí odkaz:
http://arxiv.org/abs/2407.03843
Autor:
Singh, Simranjeet, Bende, Ankit, Jha, Chandan Kumar, Rana, Vikas, Drechsler, Rolf, Patkar, Sachin, Merchant, Farhad
In-memory computing (IMC) has gained significant attention recently as it attempts to reduce the impact of memory bottlenecks. Numerous schemes for digital IMC are presented in the literature, focusing on logic operations. Often, an application's des
Externí odkaz:
http://arxiv.org/abs/2407.02921
Autor:
Völker, Laura A., Herb, Konstantin, Merchant, Darin A., Bechelli, Lorenzo, Degen, Christian L., Abendroth, John M.
Publikováno v:
Nano Lett. 2024, 24, 38, 11895-11903
Shallow nitrogen-vacancy (NV) centers in diamond offer unique opportunities for studying photochemical reactions at the single-molecule level, such as the photogeneration of radical pairs in proximal molecules. A prerequesite for such experimental sc
Externí odkaz:
http://arxiv.org/abs/2406.18272
Autor:
Yang, Chih-Hsuan, Feuer, Benjamin, Jubery, Zaki, Deng, Zi K., Nakkab, Andre, Hasan, Md Zahid, Chiranjeevi, Shivani, Marshall, Kelly, Baishnab, Nirmal, Singh, Asheesh K, Singh, Arti, Sarkar, Soumik, Merchant, Nirav, Hegde, Chinmay, Ganapathysubramanian, Baskar
We introduce Arboretum, the largest publicly accessible dataset designed to advance AI for biodiversity applications. This dataset, curated from the iNaturalist community science platform and vetted by domain experts to ensure accuracy, includes 134.
Externí odkaz:
http://arxiv.org/abs/2406.17720
During Big Bang nucleosynthesis (BBN) in the first 15 minutes of the Universe some $^7$Li was created along with isotopes of H and He. The determination of that primordial value of Li can help constrain the conditions at that time. The oldest stars w
Externí odkaz:
http://arxiv.org/abs/2406.17088
Autor:
Parrini, Luca, Soliman, Taha, Hettwer, Benjamin, Borrmann, Jan Micha, Singh, Simranjeet, Bende, Ankit, Rana, Vikas, Merchant, Farhad, Wehn, Norbert
In-Memory Computing (IMC) introduces a new paradigm of computation that offers high efficiency in terms of latency and power consumption for AI accelerators. However, the non-idealities and defects of emerging technologies used in advanced IMC can se
Externí odkaz:
http://arxiv.org/abs/2404.09818
Autor:
Reimann, Lennart M., Prashar, Anshul, Ghinami, Chiara, Pelke, Rebecca, Sisejkovic, Dominik, Merchant, Farhad, Leupers, Rainer
In contemporary Electronic Design Automation (EDA) tools, security often takes a backseat to the primary goals of power, performance, and area optimization. Commonly, the security analysis is conducted by hand, leading to vulnerabilities in the desig
Externí odkaz:
http://arxiv.org/abs/2401.17819