نتایج جستجو برای: $(u

تعداد نتایج: 164873  

Journal: :IEEE Transactions on Parallel and Distributed Systems 2021

In this paper, we propose an Efficient Two-Level I/O Caching Architecture (ETICA) for virtualized platforms that can significantly improve latency, endurance, and cost (in terms of cache size) while preserving the reliability write-pending data blocks. As opposed to previous one-level caching schemes in platforms, our proposed architecture 1) provides two levels by employing both Dynamic Random...

Journal: :Slovenika : časopis za kulturu, nauku i obrazovanje = časopis za kulturo, znanost in izobraževanje 2017

Journal: :IEEE Transactions on Pattern Analysis and Machine Intelligence 2022

Traditional Deep Neural Network (DNN) security is mostly related to the well-known adversarial input example attack. Recently, another dimension of attack, namely, attack on DNN weight parameters, has been shown be very powerful. As a representative one, Bit-Flip-based Attack (BFA) injects an extremely small amount faults into parameters hijack executing function. Prior works BFA focus <italic ...

Journal: :ACM Transactions on Design Automation of Electronic Systems 2023

In recent years, memristive crossbar-based neuromorphic computing systems (NCS) have obtained extremely high performance in neural network acceleration. However, adversarial attacks and conductance variations of memristors bring reliability challenges to NCS design. First, can fool the pose a serious threat security critical applications. On other hand, device lead degradation accuracy. this pa...

Journal: :ACM Transactions on Mathematical Software 2022

PARyOpt 1 is a Python based implementation of the Bayesian optimization routine designed for remote and asynchronous function evaluations. especially attractive computational due to its low cost footprint as well ability account uncertainties in data. A key challenge efficiently deploy any strategy on distributed computing systems synchronization step, where data from multiple calls assimilated...

Journal: :IEEE Transactions on Visualization and Computer Graphics 2023

Quantum computing has attracted considerable public attention due to its exponential speedup over classical computing. Despite advantages, today's quantum computers intrinsically suffer from noise and are error-prone. To guarantee the high fidelity of execution result a algorithm, it is crucial inform users noises used computer compiled physical circuits. However, an intuitive systematic way ma...

Journal: :ACM Transactions in Embedded Computing Systems 2023

As the machine learning and systems communities strive to achieve higher energy efficiency through custom deep neural network (DNN) accelerators, varied precision or quantization levels, model compression techniques, there is a need for design space exploration frameworks that incorporate quantization-aware processing elements into accelerator while having accurate fast power, performance, area...

Journal: :IISE transactions 2023

Unsupervised pixel-level defective region segmentation is an important task in image-based anomaly detection for various industrial applications. The state-of-the-art methods have their own advantages and limitations: matrix-decomposition-based are robust to noise, but lack complex background image modeling capability; representation-based good at localization, accuracy shape contour extraction...

Journal: :IEEE Access 2021

This paper discusses the development and implementation of architecture a Framework for Aerospace Vehicle Reasoning, `FAVER'. Integrated Health Management systems require holistic view aircraft to isolate faults cascading between systems. FAVER is system-agnostic framework developed such propagating by incorporating Digital Twins (DTs) reasoning techniques. The flexibility work with different t...

Journal: :ACM Transactions on Multimedia Computing, Communications, and Applications 2022

In recent years, malware detection has become an active research topic in the area of Internet Things (IoT) security. The principle is to exploit knowledge from large quantities continuously generated malware. Existing algorithms practise available features for IoT devices and lack real-time prediction behaviours. More thus required on cope with misclassification input data. Motivated by this, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید