Search results for "CRYPTOGRAPHY"

showing 10 items of 657 documents

Online Management of Hybrid DRAM-NVMM Memory for HPC

2019

Non-volatile main memories (NVMMs) offer a comparable performance to DRAM, while requiring lower static power consumption and enabling higher densities. NVMM therefore can provide opportunities for improving both energy efficiency and costs of main memory. Previous hybrid main memory management approaches for HPC either do not consider the unique characteristics of NVMMs, depend on high profiling costs, or need source code modifications. In this paper, we investigate HPC applications' behaviors in the presence of NVMM as part of the main memory. By performing a comprehensive study of HPC applications and based on several key observations, we propose an online hybrid memory architecture for …

010302 applied physicsProfiling (computer programming)Source codebusiness.industryComputer sciencemedia_common.quotation_subject02 engineering and technology01 natural sciences020202 computer hardware & architectureNon-volatile memoryMemory managementEmbedded system0103 physical sciencesMemory architecture0202 electrical engineering electronic engineering information engineeringKey (cryptography)businessDrammedia_common2019 IEEE 26th International Conference on High Performance Computing, Data, and Analytics (HiPC)
researchProduct

Automotive Radar in a UAV to Assess Earth Surface Processes and Land Responses

2020

The use of unmanned aerial vehicles (UAVs) in earth science research has drastically increased during the last decade. The reason being innumerable advantages to detecting and monitoring various environmental processes before and after certain events such as rain, wind, flood, etc. or to assess the current status of specific landforms such as gullies, rills, or ravines. The UAV equipped sensors are a key part to success. Besides commonly used sensors such as cameras, radar sensors are another possibility. They are less known for this application, but already well established in research. A vast number of research projects use professional radars, but they are expensive and difficult to hand…

010504 meteorology & atmospheric sciencesComputer scienceUAVReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologiesComputerApplications_COMPUTERSINOTHERSYSTEMS77 GHz02 engineering and technologylcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistrylaw.inventionARS-408lawlcsh:TP1-1185ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringRadarInstrumentationARS-404021101 geological & geomatics engineering0105 earth and related environmental sciencesRadarAtomic and Molecular Physics and OpticsEarth surfaceAutomotive radarKey (cryptography)Sensors
researchProduct

Convolutional Neural Networks for Cloud Screening: Transfer Learning from Landsat-8 to Proba-V

2018

Cloud detection is a key issue for exploiting the information from Earth observation satellites multispectral sensors. For Proba-V, cloud detection is challenging due to the limited number of spectral bands. Advanced machine learning methods, such as convolutional neural networks (CNN), have shown to work well on this problem provided enough labeled data. However, simultaneous collocated information about the presence of clouds is usually not available or requires a great amount of manual labor. In this work, we propose to learn from the available Landsat −8 cloud masks datasets and transfer this learning to solve the Proba-V cloud detection problem. CNN are trained with Landsat images adap…

010504 meteorology & atmospheric sciencesComputer sciencebusiness.industryMultispectral image0211 other engineering and technologiesPattern recognitionCloud computing02 engineering and technologySpectral bands01 natural sciencesConvolutional neural networkData modelingKey (cryptography)Artificial intelligencebusinessTransfer of learning021101 geological & geomatics engineering0105 earth and related environmental sciencesIGARSS 2018 - 2018 IEEE International Geoscience and Remote Sensing Symposium
researchProduct

Evaluation of chloroplast genome annotation tools and application to analysis of the evolution of coffee species.

2018

International audience; Chloroplast sequences are widely used for phylogenetic analysis due to their high degree of conservation in plants. Whole chloroplast genomes can now be readily obtained for plant species using new sequencing methods, giving invaluable data for plant evolution However new annotation methods are required for the efficient analysis of this data to deliver high quality phylogenetic analyses. In this study, the two main tools for chloroplast genome annotation were compared. More consistent detection and annotation of genes were produced with GeSeq when compared to the currently used Dogma. This suggests that the annotation of most of the previously annotated chloroplast …

0106 biological sciences0301 basic medicineChloroplastsPlant GenomesPlant SciencePlant Genetics01 natural sciencesGenomeCoffeeDatabase and Informatics MethodsPlant GenomicsPlastidsPhylogenyData Management2. Zero hungerPlant evolutionMultidisciplinarybiologyPhylogenetic treeQRfood and beveragesPhylogenetic AnalysisGenome projectGenomicsPhylogenetics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]MedicineEngineering and Technology[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Cellular Structures and OrganellesCellular TypesSequence AnalysisResearch ArticleBiotechnologyComputer and Information SciencesBioinformaticsSciencePlant Cell BiologyBioengineering[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Coffea canephoraGenes PlantResearch and Analysis Methods010603 evolutionary biology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingEvolution Molecular[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]03 medical and health sciencesPhylogeneticsChloroplast GenomePlant CellsGeneticsEvolutionary SystematicsGenome ChloroplastTaxonomyEvolutionary BiologyCoffea arabicaCoffeafungiBiology and Life SciencesComputational BiologyMolecular Sequence AnnotationSequence Analysis DNACell Biology15. Life on landbiology.organism_classificationGenome Analysis[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationGenome Annotation030104 developmental biologyEvolutionary biology[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Plant BiotechnologySequence AlignmentPloS one
researchProduct

Coupling agent-based with equation-based models to study spatially explicit megapopulation dynamics

2018

International audience; The incorporation of the spatial heterogeneity of real landscapes into population dynamics remains extremely difficult. We propose combining equation-based modelling (EBM) and agent-based modelling (ABM) to overcome the difficulties classically encountered. ABM facilitates the description of entities that act according to specific rules evolving on various scales. However, a large number of entities may lead to computational difficulties (e.g., for populations of small mammals, such as voles, that can exceed millions of individuals). Here, EBM handles age-structured population growth, and ABM represents the spreading of voles on large scales. Simulations applied to t…

0106 biological sciencesHybrid modellingTheoretical computer scienceComputer sciencePopulation[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]010603 evolutionary biology01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Travelling waveArvicolaPopulation growtheducation[SDV.EE]Life Sciences [q-bio]/Ecology environmenteducation.field_of_studySpatial contextual awareness010604 marine biology & hydrobiologyEcological ModelingDispersal15. Life on land[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationSpatial heterogeneityCoupling (computer programming)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Biological dispersalMontane ecology[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][SDE.BE]Environmental Sciences/Biodiversity and EcologyHybrid modelHybrid modelEcological Modelling
researchProduct

Seaport competitiveness research: the past, present and future

2019

This study presents a review of articles with a focus on seaport competitiveness from the maritime literature. We investigated how port competitiveness research has evolved during the last two decades using bibliometric citation analysis tools and techniques. Bibliography data, collected from the ISI Web of Science database, consisted of 267 research papers by 465 authors in 117 journals. Based on citation analysis, we identified the key universities, journals and articles and their impact on port competitiveness research. Also, seven key research streams with few sub-streams were revealed as a result of a mixed co-citation and in-depth content analysis of the most cited articles. A bibliom…

0106 biological sciencesIsi web of scienceKey articlesKnowledge managementbusiness.industry010604 marine biology & hydrobiologyTransportation010501 environmental sciencesManagement Science and Operations Research01 natural sciencesPort (computer networking)Citation analysisContent analysisPolitical scienceManagement of Technology and InnovationKey (cryptography)Strategic researchPort managementBusiness and International ManagementbusinessGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)0105 earth and related environmental sciencesInternational Journal of Shipping and Transport Logistics
researchProduct

Images are not and should not ever be type specimens: a rebuttal to GarraffoniFreitas.

2017

Note. This original form of this rebuttal was submitted to Science on 3 March 2017 (limited to 300 words as per Science editorial policy) but rejected on 13 March 2017. Herein, we elaborate on our original Science submission in order to more fully address the issue without the length limitations. This rebuttal is followed by the list of the signatories who supported our original submission.

0106 biological sciencesProgramming languageRebuttaleducationType specimens010607 zoologySettore BIO/05 - ZoologiaBiologycomputer.software_genre010603 evolutionary biology01 natural sciencesType (biology)Order (business)Code (cryptography)ImagesPhotographyAnimalsAnimal Science and ZoologycomputerBiological sciencesZoologyEcology Evolution Behavior and SystematicsZootaxa
researchProduct

Combining spatial prioritization and expert knowledge facilitates effectiveness of large-scale mire protection process in Finland

2019

Conservation resource allocation involves a complex set of considerations including species, habitats, connectivity, local to global biodiversity objectives, alternative protection and restoration actions, while requiring cost-efficiency and effective implementation. We present a national scale spatial conservation prioritization analysis for complementing the network of protected mires in Finland. We show how spatial prioritization coupled with regional targets and expert knowledge can facilitate structured decision-making. In our application, discussion between experts was structured around the prioritization model enabling integration of quantitative analysis with expert knowledge. The u…

0106 biological sciencesTrade-offsProcess (engineering)Computer science010604 marine biology & hydrobiologyScale (chemistry)MiresRestoration prioritization15. Life on land010603 evolutionary biology01 natural sciencesUnit (housing)Quantitative analysis (finance)13. Climate actionImplementationKey (cryptography)Expert knowledgeResource allocationSpatial prioritizationKnowledge transferEnvironmental planningEcology Evolution Behavior and Systematics1172 Environmental sciencesNature and Landscape ConservationGlobal biodiversity
researchProduct

District heating networks: enhancement of the efficiency

2019

International audience; During the decades the district heating's (DH) advantages (more cost-efficient heat generation and reduced air pollution) overcompensated the additional costs of transmission and distribution of the centrally produced thermal energy to consumers. Rapid increase in the efficiency of low-power heaters, development of separated low heat density areas in cities reduce the competitiveness of the large centralized DH systems in comparison with the distributed cluster-size networks and even local heating. Reduction of transmission costs, enhancement of the network efficiency by optimization of the design of the DH networks become a critical issue. The methodology for determ…

020209 energynetwork design02 engineering and technology7. Clean energyAutomotive engineeringReduction (complexity)JEL: C - Mathematical and Quantitative Methods/C.C4 - Econometric and Statistical Methods: Special Topics/C.C4.C45 - Neural Networks and Related Topicsbenchmarking methodologies11. Sustainability0202 electrical engineering electronic engineering information engineeringdistrict heatingbusiness.industry020208 electrical & electronic engineeringdata miningBenchmarkingJEL: O - Economic Development Innovation Technological Change and Growth/O.O1 - Economic Development/O.O1.O13 - Agriculture • Natural Resources • Energy • Environment • Other Primary Products[SHS.ECO]Humanities and Social Sciences/Economics and FinanceNetwork planning and designVariable (computer science)Transmission (telecommunications)13. Climate actionHeat generationKey (cryptography)Environmental sciencebusinessJEL: C - Mathematical and Quantitative Methods/C.C2 - Single Equation Models • Single Variables/C.C2.C24 - Truncated and Censored Models • Switching Regression Models • Threshold Regression ModelsThermal energyInsights into Regional Development
researchProduct

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct