Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 698.935
41.
  • Automatic Code Converter En... Automatic Code Converter Enhanced PCH Framework for SoC Trust Verification
    Xiaolong Guo; Dutta, Raj Gautam; Mishra, Prabhat ... IEEE transactions on very large scale integration (VLSI) systems, 12/2017, Letnik: 25, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    The wide usage of hardware intellectual property cores from untrusted vendors has raised security concerns for system designers. Existing solutions for functionality testing and verification do not ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
42.
  • DFX: A Low-Latency Multi-FP... DFX: A Low-Latency Multi-FPGA Appliance for Accelerating Transformer-Based Text Generation
    Hong, Seongmin; Moon, Seungjae; Kim, Junsoo ... 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 10/2022
    Conference Proceeding
    Odprti dostop

    Transformer is a deep learning language model widely used for natural language processing (NLP) services in datacenters. Among transformer models, Generative Pre-trained Transformer (GPT) has ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
43.
  • Bouquet of instruction poin... Bouquet of instruction pointers
    Pakalapati, Samuel; Panda, Biswabandan 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), 05/2020
    Conference Proceeding

    Hardware prefetching is one of the common off-chip DRAM latency hiding techniques. Though hardware prefetchers are ubiquitous in the commercial machines and prefetching techniques are well studied in ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
44.
  • ARK: Fully Homomorphic Encr... ARK: Fully Homomorphic Encryption Accelerator with Runtime Data Generation and Inter-Operation Key Reuse
    Kim, Jongmin; Lee, Gwangho; Kim, Sangpyo ... 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 10/2022
    Conference Proceeding
    Odprti dostop

    Homomorphic Encryption (HE) is one of the most promising post-quantum cryptographic schemes that enable privacy-preserving computation on servers. However, noise accumulates as we perform operations ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
45.
  • Semi-Permanent Stuck-At Fau... Semi-Permanent Stuck-At Fault injection attacks on Elephant and GIFT lightweight ciphers
    Joshi, Priyanka; Mazumdar, Bodhisatwa ACM transactions on design automation of electronic systems, 07/2024, Letnik: 29, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Fault attacks pose a potent threat to modern cryptographic implementations, particularly those used in physically approachable embedded devices in IoT environments. Information security in such ...
Celotno besedilo
Dostopno za: NUK, UL
46.
  • Adaptable Butterfly Acceler... Adaptable Butterfly Accelerator for Attention-Based NNs via Hardware and Algorithm Co-Design
    Fan, Hongxiang; Chau, Thomas; Venieris, Stylianos I. ... 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO), 10/2022
    Conference Proceeding
    Odprti dostop

    Attention-based neural networks have become pervasive in many AI tasks. Despite their excellent algorithmic performance, the use of the attention mechanism and feedforward network (FFN) demands ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
47.
  • Towards Scaling Blockchain ... Towards Scaling Blockchain Systems via Sharding
    Dang, Hung; Dinh, Tien Tuan Anh; Loghin, Dumitrel ... Proceedings of the 2019 International Conference on Management of Data, 06/2019
    Conference Proceeding
    Odprti dostop

    Existing blockchain systems scale poorly because of their distributed consensus protocols. Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling blockchain ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
48.
  • QUAC-TRNG QUAC-TRNG
    Olgun, Ataberk; Patel, Minesh; Yağlikçi, A. Giray ... 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), 06/2021
    Conference Proceeding
    Odprti dostop

    True random number generators (TRNG) sample random physical processes to create large amounts of random numbers for various use cases, including security-critical cryptographic primitives, scientific ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
49.
  • Hardware Trojan Detection b... Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
    Narasimhan, Seetharam; Dongdong Du; Chakraborty, Rajat Subhra ... IEEE transactions on computers, 11/2013, Letnik: 62, Številka: 11
    Journal Article
    Recenzirano

    Hardware Trojan attack in the form of malicious modification of a design has emerged as a major security threat. Sidechannel analysis has been investigated as an alternative to conventional logic ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
50.
  • XNOR Neural Engine: A Hardw... XNOR Neural Engine: A Hardware Accelerator IP for 21.6-fJ/op Binary Neural Network Inference
    Conti, Francesco; Schiavone, Pasquale Davide; Benini, Luca IEEE transactions on computer-aided design of integrated circuits and systems, 11/2018, Letnik: 37, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Binary neural networks (BNNs) are promising to deliver accuracy comparable to conventional deep neural networks at a fraction of the cost in terms of memory and energy. In this paper, we introduce ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
3 4 5 6 7
zadetkov: 698.935

Nalaganje filtrov