Showing 1 - 20 results of 80 for search '"Intel"', query time: 0.06s Refine Results
  1. 1

    POL-INTEL by Tanja Kammersgaard Christensen

    Published 2024-06-01
    Subjects: “…pol-intel…”
    Get full text
    Article
  2. 2
  3. 3

    Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios by Zhiyuan Wang, Yuezhi Zhou

    Published 2025-01-01
    “…This paper investigates the technical challenges faced by current TEE solutions, such as performance overhead and I/O security issues, in the context of the resource constraints and data mobility that are inherent to IoT and edge intelligence applications. Using Intel Software Guard Extensions (SGX) technology as a case study, this paper validates these challenges through extensive experiments. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    High-Performance 3D Compressive Sensing MRI Reconstruction Using Many-Core Architectures by Daehyun Kim, Joshua Trzasko, Mikhail Smelyanskiy, Clifton Haider, Pradeep Dubey, Armando Manduca

    Published 2011-01-01
    “…We demonstrate that a CUDA-based code running on an NVIDIA Tesla C2050 GPU can reconstruct a 256 × 160 × 80 volume from an 8-channel acquisition in 19 seconds, which is in itself a significant improvement over the state of the art. We then show that Intel's Knights Ferry can perform the same 3D MRI reconstruction in only 12 seconds, bringing CS methods even closer to clinical viability.…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Load-to-store: exploit the time leakage of store buffer transient window by Ming TANG, Yifan HU

    Published 2023-04-01
    “…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
    Get full text
    Article
  16. 16

    Medical-Surgical Nursing : assessment and management of clinical problems / by Lewis, Sharon L.

    Published 2011
    View in OPAC
    Software Book
  17. 17

    Field‐programmable gate array acceleration of the Tersoff potential in LAMMPS by Quan Deng, Qiang Liu

    Published 2025-01-01
    “…In addition, in terms of computational efficiency and power efficiency, the proposed accelerator achieves improvements of 2.00× and 7.19× compared to Intel I7‐8700K, and 4.33× and 2.11× compared to NVIDIA Titan Xp, respectively.…”
    Get full text
    Article
  18. 18
  19. 19

    Categorizing and Determining of BI-RAD Breast Cancer Score by Using Deep Learning Techniques by Azhar Kassem Flayeh, Ali Douik

    Published 2024-11-01
    “…This study used a laptop with the following specifications: an Intel Core i7 CPU, 16GB of RAM, and Intel RTX integrated graphics. …”
    Get full text
    Article
  20. 20