Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Sonia Lopez Alarcon"'
Autor:
Sonia Lopez Alarcon, Federico Rueda
Publikováno v:
The Journal of Supercomputing. 79:10533-10554
Autor:
Sonia Lopez Alarcon, Anne C. Elster
There is a lot of focus on how Quantum Computing as an accelerator differs from other traditional HPC resources, including accelerators like GPUs and FPGAs. In classical computing, how to design the interfaces that connect the different layers of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d53d8aba22887ba5dc22150d2d4a4e1
https://doi.org/10.22541/au.168165591.14552756/v1
https://doi.org/10.22541/au.168165591.14552756/v1
Autor:
Sonia Lopez Alarcon, Andrew Haverly
Publikováno v:
Photonics for Quantum 2022.
Autor:
Sonia Lopez Alarcon, Federico Rueda
Gaussian Boson Sampling is gaining relevance among the multiple technologies currently implementing quantum computing. The problem of sampling out of a boson distribution across multiple modes has a strong mathematical connection with combinatorics p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ff6fbda2ce0aa49ebe747bd4efd25f20
https://doi.org/10.21203/rs.3.rs-1813584/v1
https://doi.org/10.21203/rs.3.rs-1813584/v1
Autor:
Federico Rueda, Sonia Lopez Alarcon
Publikováno v:
2021 International Conference on Computational Science and Computational Intelligence (CSCI).
Publikováno v:
ISCAS
High-Level Synthesis (HLS) is the process of generating digital circuits from high-level algorithmic descriptions. One of the major steps in this design approach is scheduling, which uses the Control/Data Flow Graph (CDFG) of the software code and de
Publikováno v:
IGSC
We reformulate the problem of granular random close packing of 2D discs as a Quadratic Unconstrained Binary Optimization in order to utilize the D-Wave 2000Q quantum annealing computer. The solution is a set of ground states corresponding to jammed c
Publikováno v:
Journal of Computer Security. 23:541-562
In an effort to provide security and data integrity, hashing algorithms have been designed to consume an input of any length to produce a fixed length output. KECCAK was selected by NIST to become the next Secure Hashing Algorithm (SHA-3) after nearl
Publikováno v:
HPCC/CSS/ICESS
RiuNet. Repositorio Institucional de la Universitat Politécnica de Valéncia
instname
RiuNet. Repositorio Institucional de la Universitat Politécnica de Valéncia
instname
Power consumption is becoming an increasingly important component of processor design. As technology node shrinks both static and dynamic power become more relevant. This is particularly critical for the cache hierarchy. Previous implementations main
Publikováno v:
SoCC