Filters








240 Hits in 9.8 sec

3D phenotyping and quantitative trait locus mapping identify core regions of the rice genome controlling root architecture

C. N. Topp, A. S. Iyer-Pascuzzi, J. T. Anderson, C.-R. Lee, P. R. Zurek, O. Symonova, Y. Zheng, A. Bucksch, Y. Mileyko, T. Galkovskyi, B. T. Moore, J. Harer (+4 others)
2013 Proceedings of the National Academy of Sciences of the United States of America  
Root system architecture (RSA) describes the spatial organization of root systems, which is critical for root function in challenging environments (1-10).  ...  The integrated system leverages prior advances in the areas of hardware, imaging, software, and analysis (17, (20) (21) (22) .  ...  We thank Randy Clark, Jon Shaff, and Leon Kochian for collaboration and support in designing and implementing the imaging system and/or numerous intellectual contributions, Adam Price for providing seeds  ... 
doi:10.1073/pnas.1304354110 pmid:23580618 pmcid:PMC3645568 fatcat:qnja6a7ysba7leicwatftko574

Distributed applications [chapter]

1993 Lecture Notes in Computer Science  
of distributed applications Architecture of distributed applications Distributed applications Lecture Content This lecture presents various aspects and mechanisms for the design and implementation of  ...  distributed applications Basic principles for the design of distributed applications.  ...  Computing Environment (DCE) byOpen Software Foundation (OSF) (see page 19) a set of integrated components providing a coherent environment for the design and implementation of applications in heterogeneous  ... 
doi:10.1007/3-540-56663-5_11 fatcat:cipon5fg2vechp2cesn5vizmru

Deep Learning Based Cryptographic Primitive Classification [article]

Gregory D. Hill, Xavier J. A. Bellekens
2017 arXiv   pre-print
core primitives from OpenSSL with multivariate obfuscation, to draw a vastly scalable distribution.  ...  Reverse engineering potentially malicious software is a cumbersome task due to platform eccentricities and obfuscated transmutation mechanisms, hence requiring smarter, more efficient detection strategies  ...  The field of malware analysis seeks to determine the potential impact of malicious software by examining it in a controlled environment.  ... 
arXiv:1709.08385v1 fatcat:pze2f23objeybjwk53fih4c6wi

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates

Department Of Defense Comptroller's Office
2015 Zenodo  
The Defense Advanced Research Projects Agency (DARPA) FY2016 amounted to $2.868 billion in the President's request to support high-risk, high-reward research.  ...  a wide range of DoD applications.  ...  -Evaluated a network path diversity research product for potential transition into USPACOM distributed computing environments.  ... 
doi:10.5281/zenodo.1215366 fatcat:cqn5tyfixjanzp5x3tgfkpedri

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
It supports scientificstudy and experimentation that serves as the basis for more advanced knowledge andunderstanding in information, electronic, mathematical, computer, biological, and materialssciences  ...  This PE supports basic research in medical-related information and technology leading tofundamental discoveries, tools, and applications critical to solving defense-related challenges.  ...  applications in a wide range of domains.  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

Hardware architectures for public key cryptography

Lejla Batina, Sıddıka Berna Örs, Bart Preneel, Joos Vandewalle
2003 Integration  
The most abstract representation of a cryptographic application is the security protocol architecture, which details what steps make up a secure communication.  ...  The basic operation for RSA is multiplication in GF (p). As a consequence, a substantial amount of research is focused on efficient and secure implementation of modular multiplication in hardware.  ...  In 1986, Rankine [159] introduced an implementation of a 512-bit modulus exponentiator for RSA applications. A wide range of applications including smartcards was claimed.  ... 
doi:10.1016/s0167-9260(02)00053-6 fatcat:u5pkdeitprh77hcaaui66nzv24

In situ Phenotyping of Grapevine Root System Architecture by 2D or 3D Imaging: Advantages and Limits of Three Cultivation Methods

Yuko Krzyzaniak, Frédéric Cointault, Camille Loupiac, Eric Bernaud, Frédéric Ott, Christophe Salon, Anthony Laybros, Simeng Han, Marie-Claire Héloir, Marielle Adrian, Sophie Trouvelot
2021 Frontiers in Plant Science  
We have also produced a new automated analysis method of digital photographs, adapted for identifying adventitious roots as a feature of root architecture in rhizotrons.  ...  (mode of grapevine propagation), and also two 2D- (hydroponics and rhizotron) and one 3D- (neutron tomography) imaging techniques for visualization and quantification of roots.  ...  Gougeon was at the origin of the preliminary discussions about the application of the neutron imaging to the grapevine root systems.  ... 
doi:10.3389/fpls.2021.638688 fatcat:ntgdbszjerbsjmjlgubkr4qtve

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  A distributed application thirty-eight decentralized application (dApps) domain, (D-3) includes mostly proprietary applications that run based on Blockchain.Unlike conventional and existing computer applications  ...  Cloud computing: Cloud computing is rapidly or continuously developing as a standard for sharing and service the data over the remote storage areas in an online cloud server environment.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

Security FPGA Analysis [chapter]

E. Wanderley, R. Vaslin, J. Crenne, P. Cotret, G. Gogniat, J.-P. Diguet, J.-L. Danger, P. Maurine, V. Fischer, B. Badrignans, L. Barthe, P. Benoit (+1 others)
2011 Security Trends for FPGAS  
Fine grain reconfigurable architectures like FPGAs are providing many interesting features to be selected as an efficient target for embedded systems when security is an important concern.  ...  We identify the main vulnerabilities of FPGAs to tackle the security requirements based on the security pyramid concept.  ...  The SAFES (Security Architecture for Embedded Systems) approach focuses on protecting embedded systems by providing an architectural support for the prevention, detection and remediation of attacks [17  ... 
doi:10.1007/978-94-007-1338-3_2 fatcat:5iqydsjq4nhbho63ccanv5csxa

Program

2021 2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)  
In this tutorial, we will highlight the motivation behind distributed AI models for Internet of Things (IoT) applications, and cyber-physical systems (CPS), in light of traditional cloud-based architectures  ...  His research interests include wireless networking, and edge computing for IoT applications. Dr.  ...  Motivated to solve larger problem sizes, we propose a decomposition model and a nested column generation algorithm for the RSA problem. 15 Novel Design of Irregular Polar Codes for Latency Reduction  ... 
doi:10.1109/ccece53047.2021.9569199 fatcat:35c7o6f6svc5rgnyhjpbvjp7iy

Hardware-Accelerated Platforms and Infrastructures for Network Functions: A Survey of Enabling Technologies and Research Studies

Prateek Shantharama, Akhilesh S. Thyagaturu, Martin Reisslein
2020 IEEE Access  
nodes on a 2D planar routing and switching grid, thus limiting the total number of compute notes that can be supported for a given surface area.  ...  An NoC provides a scalable and layered architecture for flexible communication among nodes with a high density on a given die area.  ... 
doi:10.1109/access.2020.3008250 fatcat:kv4znpypqbatfk2m3lpzvzb2nu

A Review of Machine Learning Algorithms for Cloud Computing Security

Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, Rashid Amin, M. Waqas Shaukat, Syed Mohsan Raza, Doug Young Suh, Md. Jalil Piran
2020 Electronics  
Mobile CC (MCC) uses distributed computing to convey applications to cell phones.However, CC and edge computing have security challenges, including vulnerability for clients andassociation acknowledgment  ...  CC recentlyhas emerged as a set of public and private datacenters that offers the client a single platform acrossthe Internet.  ...  Second, the risk of outside attack is increasingly relevant for cloud applications in unsecured area. This risk includes remote software or hardware hits on cloud clients and applications [40] .  ... 
doi:10.3390/electronics9091379 fatcat:quog4rpl2beaxfoei2377oaoci

A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics

Dimitrios Pliatsios, Panagiotis Sarigiannidis, Thomas Lagkas, Antonios G. Sarigiannidis
2020 IEEE Communications Surveys and Tutorials  
In this survey, we provide an overview of the general SCADA architecture, along with a detailed description of the SCADA communication protocols.  ...  Legacy SCADA systems operated on isolated networks, that made them less exposed to Internet threats.  ...  The testbeds consist of commonly used software and hardware components across a wide range of industrial applications. The testbeds are divided into 2 categories based on their infrastructure.  ... 
doi:10.1109/comst.2020.2987688 fatcat:2z346mmksvdixjy2uzjbajbgoe

High-Level Language Tools for Reconfigurable Computing

Skyler Windh, Xiaoyin Ma, Robert J. Halstead, Prerna Budhkar, Zabdiel Luna, Omar Hussaini, Walid A. Najjar
2015 Proceedings of the IEEE  
For half a century, layers of abstractions have been developed that simplify the software development process: languages, compilers, dynamically linked libraries, operating systems, APIs, etc.  ...  | In the past decade or so we have witnessed a steadily increasing interest in FPGAs as hardware accelerators: they provide an excellent mid-point between the reprogrammability of software devices (CPUs  ...  The OpenCL specification provides a framework for programming parallel applications on a wide variety of platforms including CPUs, GPUs, DSPs, and FPGAs [29] .  ... 
doi:10.1109/jproc.2015.2399275 fatcat:oqofolqr4zh7llxpriw6jmseqq

Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining

Fei Hu, Meng Jiang, Laura Celentano, Yang Xiao
2008 Ad hoc networks  
Telemedicine platform based on ad hoc interconnection of tiny ECG sensors, called medical ad hoc sensor networks (MASN), can provide a promising approach for performing low-cost, real-time, remote cardiac  ...  To reduce the healthcare cost, it is a necessary tendency to deploy selforganized, wireless heart disease monitoring hardware/software systems.  ...  and CNS-#0716455) on telemedicine security research, (2) Sensorcon Inc. that provides three years of biochemical/medical sensor program support to us; (3) Cisco Inc. that provides University Research  ... 
doi:10.1016/j.adhoc.2007.09.002 fatcat:pypymlnauvg75n72a4p3amsrya
« Previous Showing results 1 — 15 out of 240 results