Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest 'link' in the security 'chain'. In this... more
    • by  and +2
    •   4  
      Computer SecurityLiterature ReviewCyber SecurityGraphics processing unit
This project designs an ARM System on Chip which displays a jagged Christmas tree using both, just the included processor of the system on a chip as well as a dedicated hardware accelerator module that accelerates the rasterisation of... more
    • by 
    •   5  
      Computer ArchitectureFPGAParallel Computer ArchitecturesVector Processing
Fuzzy Logic System (FLS) is an efficient method to solve engineering problems. However, the training of a Fuzzy Logic System is a time-consuming task. Optimization Algorithm can be used to optimize the rule base of any FLS. Out of Type-1... more
    • by 
    •   4  
      Interval Type 2 Fuzzy Logic SystemGraphics processing unitWhale Optimization AlgorithmCuda-C
Due to their high density and near-zero leakage power consumption, non-volatile memories (NVMs) are promising candidates for designing future memory systems. However, compared to conventional memories, NVMs also face more-severe security... more
    • by 
    •   7  
      Computer SecuritySurvey ResearchLiterature ReviewCyber Security
    • by 
    •   7  
      Computer SecuritySurvey ResearchLiterature ReviewCyber Security
    • by 
    •   7  
      Computer SecuritySurvey ResearchLiterature ReviewCyber Security
Due to their high density and near-zero leakage power consumption, non-volatile memories (NVMs) are promising candidates for designing future memory systems. However, compared to conventional memories, NVMs also face more-severe security... more
    • by 
    •   8  
      Computer ScienceComputer SecuritySurvey ResearchLiterature Review
Computational neuroscience is being revolutionized with the advent of multi-electrode arrays that provide real-time, dynamic, perspectives into brain function. Mining event streams from these chips is critical to understanding the firing... more
    • by 
    •   13  
      Computer ScienceData MiningComputational NeuroscienceSpike train analysis
Due to their high density and near-zero leakage power consumption, non-volatile memories (NVMs) are promising candidates for designing future memory systems. However, compared to conventional memories, NVMs also face more-severe security... more
    • by 
    •   7  
      Computer SecuritySurvey ResearchLiterature ReviewCyber Security
    • by 
    •   7  
      Computer SecuritySurvey ResearchLiterature ReviewCyber Security