Zobrazeno 1 - 10
of 672
pro vyhledávání: '"P. Supraja"'
Effective question classification is crucial for AI-driven educational tools, enabling adaptive learning systems to categorize questions by skill area, difficulty level, and competence. This classification not only supports educational diagnostics an
Externí odkaz:
http://arxiv.org/abs/2409.02481
Autor:
Anjaly Babu, D. Rakesh, P. Supraja, Siju Mishra, K. Uday Kumar, R. Rakesh Kumar, D. Haranath, Estari Mamidala, Raju Nagapuri
Publikováno v:
Results in Surfaces and Interfaces, Vol 8, Iss , Pp 100075- (2022)
As people became more aware of environmental issues, several designs of triboelectric energy harvesters based on biocompatible and eco-friendly natural materials have been developed in recent years. This manuscript reports a plant-based green triboel
Externí odkaz:
https://doaj.org/article/696df4a77d754f1498fa67028d225f2f
Autor:
Bertschi, Andrin, Sridhara, Supraja, Groschupp, Friederike, Kuhne, Mark, Schlüter, Benedict, Thorens, Clément, Dutly, Nicolas, Capkun, Srdjan, Shinde, Shweta
Arm Confidential Computing Architecture (CCA) executes sensitive computation in an abstraction called realm VMs and protects it from the hypervisor, host OS, and other co-resident VMs. However, CCA does not allow integrated devices on the platform to
Externí odkaz:
http://arxiv.org/abs/2408.05835
Autor:
Kuhne, Mark, Sridhara, Supraja, Bertschi, Andrin, Dutly, Nicolas, Capkun, Srdjan, Shinde, Shweta
The Android ecosystem relies on either TrustZone (e.g., OP-TEE, QTEE, Trusty) or trusted hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and Android bugs. TrustZone allows any secure world code to access the norm
Externí odkaz:
http://arxiv.org/abs/2407.16694
Autor:
Chittari, Supraja S., Lu, Zhiyue
Simulating stochastic systems with feedback control is challenging due to the complex interplay between the system's dynamics and the feedback-dependent control protocols. We present a single-step-trajectory probability analysis to time-dependent sto
Externí odkaz:
http://arxiv.org/abs/2405.03997
User programs recover from hardware exceptions and respond to signals by executing custom handlers that they register specifically for such events. We present SIGY attack, which abuses this programming model on Intel SGX to break the confidentiality
Externí odkaz:
http://arxiv.org/abs/2404.13998
AMD SEV-SNP offers VM-level trusted execution environments (TEEs) to protect the confidentiality and integrity for sensitive cloud workloads from untrusted hypervisor controlled by the cloud provider. AMD introduced a new exception, #VC, to facilitat
Externí odkaz:
http://arxiv.org/abs/2404.03526
Hardware-based Trusted execution environments (TEEs) offer an isolation granularity of virtual machine abstraction. They provide confidential VMs (CVMs) that host security-sensitive code and data. AMD SEV-SNP and Intel TDX enable CVMs and are now ava
Externí odkaz:
http://arxiv.org/abs/2404.03387
End-stage renal disease has many adverse complications associated with it leading to 20-50% higher mortality rates in people than those without the disease. This makes it one of the leading causes of death in the United States. This article analyzes
Externí odkaz:
http://arxiv.org/abs/2309.06270
Publikováno v:
Indian Journal of Radiology and Imaging, Vol 34, Iss 04, Pp 677-687 (2024)
Nonmass lesions in breast ultrasound (US) are areas of altered echogenicity without definite margins or mass effect. However, these lesions may show calcifications, associated architectural distortion, or shadowing just like masses. They vary in thei
Externí odkaz:
https://doaj.org/article/e761481b8dc24bb6b5805de55f80e0bb