-
1
-
2
FCM Clustering Approach Optimization Using Parallel High-Speed Intel FPGA Technology
Published 2022-01-01Get full text
Article -
3
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
Published 2025-01-01“…This paper investigates the technical challenges faced by current TEE solutions, such as performance overhead and I/O security issues, in the context of the resource constraints and data mobility that are inherent to IoT and edge intelligence applications. Using Intel Software Guard Extensions (SGX) technology as a case study, this paper validates these challenges through extensive experiments. …”
Get full text
Article -
4
El dret d’accés a la informació pública, la protecció de dades i la intel·ligència artificial
Published 2024-12-01Subjects: Get full text
Article -
5
Research on system call forwarding mechanism of SGX-based LibOS
Published 2024-10-01Subjects: “…Intel SGX…”
Get full text
Article -
6
-
7
Security-enhanced live migration based on SGX for virtual machine
Published 2017-09-01Subjects: Get full text
Article -
8
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: Get full text
Article -
9
Del llenguatge planer a la comunicació clara. Introducció a la secció monogràfica
Published 2024-12-01Subjects: Get full text
Article -
10
High-Performance 3D Compressive Sensing MRI Reconstruction Using Many-Core Architectures
Published 2011-01-01“…We demonstrate that a CUDA-based code running on an NVIDIA Tesla C2050 GPU can reconstruct a 256 × 160 × 80 volume from an 8-channel acquisition in 19 seconds, which is in itself a significant improvement over the state of the art. We then show that Intel's Knights Ferry can perform the same 3D MRI reconstruction in only 12 seconds, bringing CS methods even closer to clinical viability.…”
Get full text
Article -
11
-
12
-
13
Design Considerations for Sub-1-V 1T1C FeRAM Memory Circuits
Published 2024-01-01Get full text
Article -
14
-
15
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01“…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
Get full text
Article -
16
Medical-Surgical Nursing : assessment and management of clinical problems /
Published 2011View in OPAC
Software Book -
17
Field‐programmable gate array acceleration of the Tersoff potential in LAMMPS
Published 2025-01-01“…In addition, in terms of computational efficiency and power efficiency, the proposed accelerator achieves improvements of 2.00× and 7.19× compared to Intel I7‐8700K, and 4.33× and 2.11× compared to NVIDIA Titan Xp, respectively.…”
Get full text
Article -
18
Antenna Measurement Systems and Antenna Technology for Next Wireless Generation
Published 2013-01-01Get full text
Article -
19
Categorizing and Determining of BI-RAD Breast Cancer Score by Using Deep Learning Techniques
Published 2024-11-01“…This study used a laptop with the following specifications: an Intel Core i7 CPU, 16GB of RAM, and Intel RTX integrated graphics. …”
Get full text
Article -
20
Beyond 200-Gb/s PAM4 ADC and DAC-Based Transceiver for Wireline and Linear Optics Applications
Published 2024-01-01Get full text
Article