Showing 21 - 40 results of 85 for search '"Computer Architecture"', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26
  7. 27

    Development of dependable embedded computer systems by De-qi KONG, Ya-hui LI, Peng GUO

    Published 2013-08-01
    “…Based on the trend of dependable technology, the dependable computer architecture was proposed with three dimensions, integrity level, fault-tolerant scope and redundancy scope, in order to emphasize the key technologies in the safety critical domain.…”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33

    Research on ciphertext search and sharing technology in edge computing mode by Jifeng WANG, Guofeng WANG

    Published 2022-04-01
    “…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
    Get full text
    Article
  14. 34

    DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer by Bo Mei, Zhengbin Zhu, Peijie Li, Bo Zhao

    Published 2024-01-01
    “…In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
    Get full text
    Article
  15. 35

    Personalized lightweight distributed network intrusion detection system in fog computing by Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU

    Published 2023-06-01
    “…With the continuous development of Internet of Things (IoT) technology, there is a constant emergency of new IoT applications with low latency, high dynamics, and large bandwidth requirements.This has led to the widespread aggregation of massive devices and information at the network edge, promoting the emergence and deep development of fog computing architecture.However, with the widespread and in-depth application of fog computing architecture, the distributed network security architecture deployed to ensure its security is facing critical challenges brought by fog computing itself, such as the limitations of fog computing node computing and network communication resources, and the high dynamics of fog computing applications, which limit the edge deployment of complex network intrusion detection algorithms.To effectively solve the above problems, a personalized lightweight distributed network intrusion detection system (PLD-NIDS) was proposed based on the fog computing architecture.A large-scale complex network flow intrusion detection model was trained based on the convolutional neural network architecture, and furthermore the network traffic type distribution of each fog computing node was collected.The personalized model distillation algorithm and the weighted first-order Taylor approximation pruning algorithm were proposed to quickly compress the complex model, breaking through the limitation of traditional model compression algorithms that can only provide single compressed models for edge node deployment due to the high compression calculation overhead when facing a large number of personalized nodes.According to experimental results, the proposed PLD-NIDS architecture can achieve fast personalized compression of edge intrusion detection models.Compared with traditional model pruning algorithms, the proposed architecture achieves a good balance between computational loss and model accuracy.In terms of model accuracy, the proposed weighted first-order Taylor approximation pruning algorithm can achieve about 4% model compression ratio improvement under the same 0.2% model accuracy loss condition compared with the traditional first-order Taylor approximation pruning algorithm.…”
    Get full text
    Article
  16. 36

    Using the Functional Reach Test for Probing the Static Stability of Bipedal Standing in Humanoid Robots Based on the Passive Motion Paradigm by Jacopo Zenzeri, Dalia De Santis, Vishwanathan Mohan, Maura Casadio, Pietro Morasso

    Published 2013-01-01
    “…The goal of this paper is to analyze the static stability of a computational architecture, based on the Passive Motion Paradigm, for coordinating the redundant degrees of freedom of a humanoid robot during whole-body reaching movements in bipedal standing. …”
    Get full text
    Article
  17. 37

    Research on consistency protection mechanism for secure states of virtual domain in cloud environment by Wei-qi DAI, De-qing ZOU, Hai JIN, Yan XIA

    Published 2016-10-01
    “…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
    Get full text
    Article
  18. 38

    Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors. by Bamwine, Delik

    Published 2024
    “…On one hand, the advent of modern high-performance computing architectures with increasing computing power has greatly enhanced our capability to deal with a large volume of data. …”
    Get full text
    Thesis
  19. 39

    Network modal innovation for distributed machine learning by Zehua GUO, Haowen ZHU, Tongwen XU

    Published 2023-06-01
    “…Distributed machine learning, as a popular computing architecture for artificial intelligence, still faces challenges of slow model training and poor data performance transmission.Traditional network modalities were un able to meet the communication needs of distributed machine learning scenarios, hindering the improvement of model training performance.New network modalities and operation logic for distributed machine learning scenarios using multimodal network technology were proposed.This approach was designed based on application characteristics and provides implications for the use of multimodal network technology in various industries.…”
    Get full text
    Article
  20. 40

    The Legacy of Roland Glowinski by Bensoussan, Alain, Pironneau, Olivier

    Published 2023-04-01
    “…He marked his time and his books will be authorities as long as computer architectures are similar to their present structures.…”
    Get full text
    Article