-
21
On the Stability of the Kubernetes Horizontal Autoscaler Control Loop
Published 2025-01-01Get full text
Article -
22
Hardware-efficient preparation of architecture-specific graph states on near-term quantum computers
Published 2025-01-01Get full text
Article -
23
-
24
Backtesting Quantum Computing Algorithms for Portfolio Optimization
Published 2024-01-01Get full text
Article -
25
Automated Fillet Weld Inspection Based on Deep Learning from 2D Images
Published 2025-01-01Get full text
Article -
26
Optimal Partitioning of Quantum Circuits Using Gate Cuts and Wire Cuts
Published 2024-01-01Get full text
Article -
27
Development of dependable embedded computer systems
Published 2013-08-01“…Based on the trend of dependable technology, the dependable computer architecture was proposed with three dimensions, integrity level, fault-tolerant scope and redundancy scope, in order to emphasize the key technologies in the safety critical domain.…”
Get full text
Article -
28
-
29
-
30
Episodic Reasoning for Vision-Based Human Action Recognition
Published 2014-01-01Get full text
Article -
31
An Intrusion Detection System Based on Deep Learning and Metaheuristic Algorithm for IOT
Published 2024-04-01Get full text
Article -
32
Crop Row Detection in Maize Fields Inspired on the Human Visual Perception
Published 2012-01-01Get full text
Article -
33
Research on ciphertext search and sharing technology in edge computing mode
Published 2022-04-01“…Aiming at the problem of edge computing data security, a ciphertext search and sharing solution was proposed, where the above-mentioned edge computing advantages were used to achieve user privacy data protection, edge nodes were used to construct encrypted inverted indexes, indexes and keys between edge nodes and cloud computing platforms were securely shared, and ciphertext search, secure data sharing, and dynamic index update were realized without changing the edge computing architecture and cloud computing architecture.Finally, compared to existing schemes, performance and security were analyzed and discussed, which proves that the proposed scheme has high security strength under ciphertext search attack model, and the ciphertext search efficiency and document dynamic update function are taken into account based on encrypted inverted index.…”
Get full text
Article -
34
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
Get full text
Article -
35
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01“…With the continuous development of Internet of Things (IoT) technology, there is a constant emergency of new IoT applications with low latency, high dynamics, and large bandwidth requirements.This has led to the widespread aggregation of massive devices and information at the network edge, promoting the emergence and deep development of fog computing architecture.However, with the widespread and in-depth application of fog computing architecture, the distributed network security architecture deployed to ensure its security is facing critical challenges brought by fog computing itself, such as the limitations of fog computing node computing and network communication resources, and the high dynamics of fog computing applications, which limit the edge deployment of complex network intrusion detection algorithms.To effectively solve the above problems, a personalized lightweight distributed network intrusion detection system (PLD-NIDS) was proposed based on the fog computing architecture.A large-scale complex network flow intrusion detection model was trained based on the convolutional neural network architecture, and furthermore the network traffic type distribution of each fog computing node was collected.The personalized model distillation algorithm and the weighted first-order Taylor approximation pruning algorithm were proposed to quickly compress the complex model, breaking through the limitation of traditional model compression algorithms that can only provide single compressed models for edge node deployment due to the high compression calculation overhead when facing a large number of personalized nodes.According to experimental results, the proposed PLD-NIDS architecture can achieve fast personalized compression of edge intrusion detection models.Compared with traditional model pruning algorithms, the proposed architecture achieves a good balance between computational loss and model accuracy.In terms of model accuracy, the proposed weighted first-order Taylor approximation pruning algorithm can achieve about 4% model compression ratio improvement under the same 0.2% model accuracy loss condition compared with the traditional first-order Taylor approximation pruning algorithm.…”
Get full text
Article -
36
Using the Functional Reach Test for Probing the Static Stability of Bipedal Standing in Humanoid Robots Based on the Passive Motion Paradigm
Published 2013-01-01“…The goal of this paper is to analyze the static stability of a computational architecture, based on the Passive Motion Paradigm, for coordinating the redundant degrees of freedom of a humanoid robot during whole-body reaching movements in bipedal standing. …”
Get full text
Article -
37
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01“…The traditional trusted computing architecture was suffering from the cloud uncertainty and dynamics caused by VM rollback or migration,which was a fatal threat to the cloud security.following investigations were conducted.Secure cloud virtual domain basic architecture; Time state consistence and collection mechanism.Cyber state consistence and collection mechanism.This study guaranteed security state consistence of virtual domain and improved the security and efficiency of the online service platform for both government institutions and companies.…”
Get full text
Article -
38
Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors.
Published 2024“…On one hand, the advent of modern high-performance computing architectures with increasing computing power has greatly enhanced our capability to deal with a large volume of data. …”
Get full text
Thesis -
39
Network modal innovation for distributed machine learning
Published 2023-06-01“…Distributed machine learning, as a popular computing architecture for artificial intelligence, still faces challenges of slow model training and poor data performance transmission.Traditional network modalities were un able to meet the communication needs of distributed machine learning scenarios, hindering the improvement of model training performance.New network modalities and operation logic for distributed machine learning scenarios using multimodal network technology were proposed.This approach was designed based on application characteristics and provides implications for the use of multimodal network technology in various industries.…”
Get full text
Article -
40
The Legacy of Roland Glowinski
Published 2023-04-01“…He marked his time and his books will be authorities as long as computer architectures are similar to their present structures.…”
Get full text
Article