نتایج جستجو برای: coprocessor
تعداد نتایج: 1189 فیلتر نتایج به سال:
In the new Internet of Things (IoT) era, embedded Field-Programmable Gate Array (FPGA) technology is enabling deployment custom-tailored IoT solutions for handling different application requirements and workloads. Combined with open RISC-V Instruction Set Architecture (ISA), FPGA provides endless opportunities to create reconfigurable devices accelerators coprocessors tightly loosely coupled pr...
We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, reduce the hardware resources achieve reasonable time cryptographic computatio...
Cyclic Redundancy Checks (CRC) constitute an important class of hash functions for detecting changes in data blocks after transmission, storage and retrieval, or distributed processing. Currently, most sequential methods based on Horner’s scheme are applied with some extensions or modifications. The flexibility of these methods with respect to the generator polynomial and the sequence of data p...
Relational database management systems (RDBMSs) provide the best understood and most carefully engineered query processing infrastructure available today. However, RDBMSs are often operated as plain stores that do little more than reproduce stored data items for further processing outside the database host, in the general-purpose programming language heap. One reason for this is that the aforem...
Traditionally, in distributed memory architectures, locality maintenance and load balancing are seen as user level activities involving compiler and runtime system support in software. Such software solutions require an explicit phase of execution, requiring the application to suspend its activities. This paper presents the rst (to our knowledge) architecture-level scheme for extracting localit...
We propose a framework where a user can outsource his data to a cloud server in an encrypted form and then request the server to perform computations on this data and sort the result. Sorting is achieved via a novel protocol where the server is assisted by a secure coprocessor that is required to have only minimal computational and memory resources. The server and the coprocessor are assumed to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید