Filters








60 Hits in 4.4 sec

A Survey and Tutorial on Security and Resilience of Quantum Computing [article]

Abdullah Ash Saki, Mahabubul Alam, Koustubh Phalak, Aakarshitha Suresh, Rasit Onur Topaloglu, Swaroop Ghosh
2021 arXiv   pre-print
Furthermore, quantum computers face several threat models from insider and outsider adversaries including input tampering, program misallocation, fault injection, Reverse Engineering (RE), and Cloning.  ...  measures the energy state of the qubit, on the acquire channel.  ...  They only consider qubits used in the particular layer and their neighbors.  ... 
arXiv:2106.06081v1 fatcat:se6dqpnvhzdm5hohv4apfwfhdu

Table of contents

2021 ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
Research Asia, China; Jinzhu Li, Sheng Zhao, Microsoft Azure Speech, China; Enhong Chen, University of Science and Technology of China, China; Tie-Yan Liu, Microsoft Research Asia, China SPE-3.6: A NEW  ...  Prasobh Sankar, Sundeep Prabhakar Chepuri, Indian Institute of Science, Bangalore, India SPCOM-4.3: AN EFFICIENT ALGORITHM FOR DEVICE DETECTION AND CHANNEL ................................. 4870 ESTIMATION  ... 
doi:10.1109/icassp39728.2021.9414617 fatcat:m5ugnnuk7nacbd6jr6gv2lsfby

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
., devices with intelligence and data processing capabilities), providing resource efficiency, performance, data privacy, and security guarantees.  ...  The aim of this deliverable is to review the state-of-the-art in techniques used in the development and operation of AI applications in computing continua and the related technologies.  ...  Azure Sphere OS is a custom Linux-based microcontroller operating system created by Microsoft to run on an Azure Sphere-certified chip and to connect to the Azure Sphere Security Service.  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

QDLC – The Quantum Development Life Cycle [article]

Nivedita Dey, Mrityunjay Ghosh, Subhra Samir kundu, Amlan Chakrabarti
2020 arXiv   pre-print
The possibilities opened by quantum computation (QC) is no where analogous to any classical simulation as quantum computers can efficiently simulate the complex dynamics of strongly correlated inter-facial  ...  The currently available quantum simulator with QDK as Q# is capable to process upto 32 qubits on user machine, expandable upto 42 qubits on Azure platform.  ...  of complex quantum gates into a cascade of simple one-qubit and two-qubit quantum gates using Fault Tolerant Quantum Logic Synthesis (FTQLS)  ... 
arXiv:2010.08053v1 fatcat:koqbzd3r6bfivful4fgddmo42e

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The PI Integrator cleanses, augments, shapes, and transmits data from PI into common business intelligence and data warehouse tools, such as Power BI, Tableau, Hadoop, Microsoft Azure, and Amazon Web Services  ...  Sending funds is moving from one side of the channel to the other.  ...  This is intended to be used also for integrity verification of the Trust Points.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Another Flip in the Wall of Rowhammer Defenses

Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
2018 2018 IEEE Symposium on Security and Privacy (SP)  
Our Rowhammer enclave can be used for coordinated denialof-service attacks in the cloud and for privilege escalation on personal computers.  ...  Memory waylaying exploits system-level optimizations and a side channel to coax the operating system into placing target pages at attackerchosen physical locations.  ...  Recently, Microsoft [51] introduced Azure confidential computing that enables developers to use SGX in their cloud.  ... 
doi:10.1109/sp.2018.00031 dblp:conf/sp/GrussLSGJOSY18 fatcat:hzjmghpj2rfyjl7uu2ibfnj5mi

Another Flip in the Wall of Rowhammer Defenses [article]

Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom
2018 arXiv   pre-print
Our Rowhammer enclave can be used for coordinated denial-of-service attacks in the cloud and for privilege escalation on personal computers.  ...  Memory waylaying exploits system-level optimizations and a side channel to coax the operating system into placing target pages at attacker-chosen physical locations.  ...  Recently, Microsoft [51] introduced Azure confidential computing that enables developers to use SGX in their cloud.  ... 
arXiv:1710.00551v2 fatcat:as43rayi2zadziuanflwh2qbri

Firmware over-the-air programming techniques for IoT networks – A survey [article]

Konstantinos Arakadakis, Pavlos Charalampidis, Antonis Makrogiannakis, Alexandros Fragkiadakis
2020 arXiv   pre-print
In addition, we discuss schemes that focus on securing the OTAP process.  ...  limitations of IoT devices, such as installation in locations with limited physical access, resource-constraint nature, large scale and high heterogeneity, should be taken into consideration for designing an efficient  ...  into other major IoT platforms, such as Google Cloud IoT Core and Microsoft Azure IoT.  ... 
arXiv:2009.02260v2 fatcat:wwemcsa6f5gfrifyiswkldd6ba

A Review on the Role of Nano-Communication in Future Healthcare Systems: A Big Data Analytics Perspective

Ali Rizwan, Ahmed Zoha, Rui Zhang, Wasim Ahmad, Kamran Arshad, Najah Abu Ali, Akram Alomainy, Muhammad Ali Imran, Qammer H. Abbasi
2018 IEEE Access  
Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure, Cloudera, Hortonworks, and MapR, are the few of the popular names who provide cloud service commercially.  ...  The fourth one is a hyper cliquebased data cleaning technique. Authors in [88] recommend the use of Fuzzy logic as a resilient and consistent approach to handle noise.  ... 
doi:10.1109/access.2018.2859340 fatcat:5xnpp3phbzeslneyezhcx6jvzq

Communication-Efficient Edge AI: Algorithms and Systems [article]

Yuanming Shi, Kai Yang, Tao Jiang, Jun Zhang, Khaled B. Letaief
2020 arXiv   pre-print
Artificial intelligence (AI) has achieved remarkable breakthroughs in a wide range of fields, ranging from speech processing, image classification to drug discovery.  ...  We then introduce communication-efficient techniques, from both algorithmic and system perspectives for training and inference tasks at the network edge.  ...  [112] proposed to use a logical tree topology for communication, based on which they mitigated stragglers by gradient coding techniques.  ... 
arXiv:2002.09668v1 fatcat:nhasdzb7t5dt5brs2r7ocdzrnm

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
Highlights include a comprehensive review of deep learning in electron microscopy; large new electron microscopy datasets for machine learning, dataset search engines based on variational autoencoders,  ...  and automatic data clustering by t-distributed stochastic neighbour embedding; adaptive learning rate clipping to stabilize learning; generative adversarial networks for compressed sensing with spiral  ...  Microsoft Azure Blog, Online: https://azure.microsoft.com/en-us/blog/microsoft-and-facebook-create-open-ecosystem-for-ai-model-intero perability (2017). 511. ONNX Model Zoo.  ... 
doi:10.5281/zenodo.4598227 fatcat:hm2ksetmsvf37adjjefmmbakvq

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
Highlights include a comprehensive review of deep learning in electron microscopy; large new electron microscopy datasets for machine learning, dataset search engines based on variational autoencoders,  ...  and automatic data clustering by t-distributed stochastic neighbour embedding; adaptive learning rate clipping to stabilize learning; generative adversarial networks for compressed sensing with spiral  ...  Microsoft Azure Blog, Online: https://azure.microsoft.com/en-us/blog/microsoft-and-facebook-create-open-ecosystem-for-ai-model-intero perability (2017). 511. ONNX Model Zoo.  ... 
doi:10.5281/zenodo.4591029 fatcat:zn2hvfyupvdwlnvsscdgswayci

Advances in Electron Microscopy with Deep Learning

Jeffrey Ede
2020 Zenodo  
Highlights include a comprehensive review of deep learning in electron microscopy; large new electron microscopy datasets for machine learning, dataset search engines based on variational autoencoders,  ...  and automatic data clustering by t-distributed stochastic neighbour embedding; adaptive learning rate clipping to stabilize learning; generative adversarial networks for compressed sensing with spiral  ...  Microsoft Azure Blog, Online: https://azure.microsoft.com/en-us/blog/microsoft-and-facebook-create-open-ecosystem-for-ai-model-intero perability (2017). 511. ONNX Model Zoo.  ... 
doi:10.5281/zenodo.4399748 fatcat:63ggmnviczg6vlnqugbnrexsgy

Review: Deep Learning in Electron Microscopy [article]

Jeffrey M. Ede
2020 arXiv   pre-print
Microsoft Azure Blog, Online: https://azure.microsoft.com/en-us/blog/microsoft-and-facebook-create-open-ecosystem-for-ai-model-intero perability (2017). 511. ONNX Model Zoo.  ...  Single-Channel Mixed Speech Recognition Using Deep Neural Networks. In 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 5632-5636 (IEEE, 2014). 35.  ... 
arXiv:2009.08328v4 fatcat:umocfp5dgvfqzck4ontlflh5ca

Conference Program

2021 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)  
His research focuses on ways to optimize resources in civil and infrastructure projects.  ...  He received his Ph.D. degree in Civil Engineering with an emphasis on Construction Management from Auburn University and an M.S. degree in Civil Engineering from The University of Tennessee at Chattanooga  ...  In this paper, we address the issue of oil spillage location exposure within the Arabian Gulf region leveraging a Machine-Learning (ML) workflow on a cloud-based computing platform: Microsoft Azure Machine-Learning  ... 
doi:10.1109/3ict53449.2021.9581455 fatcat:zgaclsoapjbhbmjmki7bjltre4
« Previous Showing results 1 — 15 out of 60 results