-
101
A memristive all-inclusive hypernetwork for parallel analog deployment of full search space architectures
Published 2024“…<p dir="ltr">In recent years, there has been a significant advancement in memristor-based neural networks, positioning them as a pivotal processing-in-memory deployment architecture for a wide array of deep learning applications. …”
-
102
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…Processing similar features that provide redundant information increases the computational time, which is a critical problem especially for users with constrained resources (battery, energy). …”
-
103
-
104
A Framework for Multi-cloud Cooperation with Hardware Reconfiguration Support
Published 2013“…Cloud computing is increasingly becoming a desirable and foundational element in international enterprise computing. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
105
-
106
How does varying the number of personas affect user perceptions and behavior? Challenging the ‘small personas’ hypothesis!
Published 2022“…Our study results from eye-tracking and survey data suggest that when using interactive persona systems, the number of personas can be increased from the conventionally suggested ‘less than ten’, without significant negative effects on user perceptions or task performance, and with the positive effects of increasing engagement with the personas, having a more diverse representation of the end-user population, as well as users accessing personas from more varied demographic groups for a design task. …”
-
107
-
108
-
109
Super Neurons
Published 2023“…It is highly desired to improve the receptive field size without increasing the kernel dimensions. This requires a significant upgrade over the generative neurons to achieve the “non-localized kernel operations” for each connection between consecutive layers. …”
-
110
-
111
-
112
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
113
-
114
-
115
-
116
-
117
-
118
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
119
-
120
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”