咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 光学工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 生物工程
  • 4 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 hardware
  • 5 篇 cryptography
  • 4 篇 throughput
  • 3 篇 tools
  • 2 篇 supercomputers
  • 2 篇 protocols
  • 2 篇 mathematical mod...
  • 2 篇 data models
  • 2 篇 training
  • 1 篇 conferences
  • 1 篇 reed-solomon cod...
  • 1 篇 runtime
  • 1 篇 tuning
  • 1 篇 access control
  • 1 篇 quantum computin...
  • 1 篇 data privacy
  • 1 篇 integrated circu...
  • 1 篇 application soft...
  • 1 篇 leadership
  • 1 篇 fault tolerance

机构

  • 3 篇 adaptive and sec...
  • 3 篇 adaptive and sec...
  • 2 篇 adaptive and sec...
  • 2 篇 adaptive and sec...
  • 2 篇 adaptive and sec...
  • 2 篇 argonne national...
  • 1 篇 adaptive and sec...
  • 1 篇 reliable computi...
  • 1 篇 the charles star...
  • 1 篇 adaptive and sec...
  • 1 篇 the charles star...
  • 1 篇 lincoln laborato...
  • 1 篇 adaptive and sec...
  • 1 篇 boston universit...
  • 1 篇 adaptive and sec...
  • 1 篇 mit lincoln labo...
  • 1 篇 mit lincoln labo...
  • 1 篇 mit lincoln labo...
  • 1 篇 adaptive and sec...
  • 1 篇 adaptive and sec...

作者

  • 10 篇 michel a. kinsy
  • 8 篇 kinsy michel a.
  • 5 篇 bu lake
  • 5 篇 eliakin del rosa...
  • 5 篇 mihailo isakov
  • 3 篇 agrawal rashmi
  • 3 篇 karen gettings
  • 3 篇 isakov mihailo
  • 3 篇 sandeep madiredd...
  • 3 篇 philip carns
  • 3 篇 robert b. ross
  • 3 篇 rashmi agrawal
  • 3 篇 lake bu
  • 3 篇 prasanna balapra...
  • 2 篇 ehret alan
  • 2 篇 cheng hai
  • 2 篇 vijay gadepally
  • 2 篇 kava donato
  • 2 篇 alan ehret
  • 1 篇 hien d. nguyen

语言

  • 18 篇 英文
检索条件"机构=Adaptive and Secure Computing Systems Laboratory"
18 条 记 录,以下是1-10 订阅
排序:
Towards programmable all-digital true random number generator  20
Towards programmable all-digital true random number generato...
收藏 引用
30th Great Lakes Symposium on VLSI, GLSVLSI 2020
作者: Agrawal, Rashmi Bu, Lake Del Rosario, Eliakin Kinsy, Michel A. Adaptive and Secure Computing Systems Laboratory Department of Electrical and Computer Engineering Boston University United States Charles Stark Draper Laboratory Inc. CambridgeMA United States
Random number generator (RNG) is a core component in many applications such as scientific research, testing and diagnosis, gaming, and cryptosystems (e.g., obfuscation, encryption, and authentication). Although, there... 详细信息
来源: 评论
A Hardware Root-of-Trust Design for Low-Power SoC Edge Devices
A Hardware Root-of-Trust Design for Low-Power SoC Edge Devic...
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Alan Ehret Eliakin Del Rosario Karen Gettings Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Texas A&M University MIT Lincoln Laboratory
In this work, we introduce a hardware root-of-trust architecture for low-power edge devices. An accelerator-based SoC design that includes the hardware root-of-trust architecture is developed. An example application f... 详细信息
来源: 评论
Design-flow Methodology for secure Group Anonymous Authentication
Design-flow Methodology for Secure Group Anonymous Authentic...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Rashmi Agrawal Lake Bu Eliakin Del Rosario Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Boston University The Charles Stark Draper Laboratory Cambridge MA
In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and privacy levels. In many of these systems, the need frequently... 详细信息
来源: 评论
A Post-Quantum secure Discrete Gaussian Noise Sampler
A Post-Quantum Secure Discrete Gaussian Noise Sampler
收藏 引用
IEEE International Workshop on Hardware-Oriented Security and Trust (HOST)
作者: Rashmi Agrawal Lake Bu Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Boston University The Charles Stark Draper Laboratory Inc. Cambridge MA
While the notion of achieving “quantum supremacy” may be debatable, rapid developments in the field of quantum computing are heading towards more realistic quantum computers. As practical quantum computers start bec... 详细信息
来源: 评论
HPC I/O Throughput Bottleneck Analysis with Explainable Local Models  20
HPC I/O Throughput Bottleneck Analysis with Explainable Loca...
收藏 引用
Supercomputing Conference
作者: Mihailo Isakov Eliakin del Rosario Sandeep Madireddy Prasanna Balaprakash Philip Carns Robert B. Ross Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Texas A & M University College Station TX Argonne National Laboratory Lemont IL
With the growing complexity of high-performance computing (HPC) systems, achieving high performance can be difficult because of I/O bottlenecks. We analyze multiple years' worth of Darshan logs from the Argonne Le... 详细信息
来源: 评论
Gauge: An Interactive Data-Driven Visualization Tool for HPC Application I/O Performance Analysis
Gauge: An Interactive Data-Driven Visualization Tool for HPC...
收藏 引用
IEEE/ACM International Parallel Data systems Workshop (PDSW)
作者: Eliakin del Rosario Mikaela Currier Mihailo Isakov Sandeep Madireddy Prasanna Balaprakash Philip Carns Robert B. Ross Kevin Harms Shane Snyder Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Texas A&M University College Station TX Argonne National Laboratory Lemont IL
Understanding and alleviating I/O bottlenecks in HPC system workloads is difficult due to the complex, multilayered nature of HPC I/O subsystems. Even with full visibility into the jobs executed on the system, the lac... 详细信息
来源: 评论
Toward Generalizable Models of I/O Throughput
Toward Generalizable Models of I/O Throughput
收藏 引用
Runtime and Operating systems for Supercomputers (ROSS), IEEE/ACM International Workshop on
作者: Mihailo Isakov Eliakin del Rosario Sandeep Madireddy Prasanna Balaprakash Philip Carns Robert B. Ross Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Texas A&M University College Station TX 77843 Argonne National Laboratory Lemont IL 60439
Many modern HPC applications do not make good use of the limited available I/O bandwidth. Developing an understanding of the I/O subsystem is a critical first step in order to better utilize an HPC system. While exper... 详细信息
来源: 评论
Design of reliable storage and compute systems with lightweight group testing based non-binary error correction codes
Design of reliable storage and compute systems with lightwei...
收藏 引用
作者: Bu, Lake Karpovsky, Mark G. Kinsy, Michel A. Adaptive and Secure Computing Systems Laboratory Department of Electrical and Computer Engineering Boston University Boston United States Reliable Computing Laboratory Department of Electrical and Computer Engineering Boston University Boston United States
In this study, the authors propose a new group testing based (GTB) error control codes (ECCs) approach for improving the reliability of memory structures in computing systems. Compared with conventional single- A nd d... 详细信息
来源: 评论
Homomorphic Encryption Based secure Sensor Data Processing
Homomorphic Encryption Based Secure Sensor Data Processing
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Vijay Gadepally Mihailo Isakov Rashmi Agrawal Jeremy Kepner Karen Gettings Michel A. Kinsy Lincoln Laboratory Massachusetts Institute of Technology Lexington MA Adaptive and Secure Computing Systems (ASCS) Laboratory Texas A&M University College Station TX Boston University Boston MA
Novel sensor processing algorithms face many hurdles to their adoption. Sensor processing environments have become increasingly difficult with an ever increasing array of threats. These threats have, in turn, raised t... 详细信息
来源: 评论
Post-quantum cryptographic hardware primitives
arXiv
收藏 引用
arXiv 2019年
作者: Bu, Lake Agrawal, Rashmi Cheng, Hai Kinsy, Michel A. Adaptive and Secure Computing Systems Laboratory Department of Electrical and Computer Engineering Boston University
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years. In... 详细信息
来源: 评论