Search
Search Results
-
Field Instruction Multiple Data
Fully homomorphic encryption (FHE) has flourished since it was first constructed by Gentry (STOC 2009). Single instruction multiple data (SIMD) gave... -
The effect of student engagement strategies in online instruction for data management skills
Evaluating the effectiveness of teaching methods for synchronous online instruction is integral to fostering student engagement and maximizing...
-
Evaluating RISC-V Vector Instruction Set Architecture Extension with Computer Vision Workloads
Computer vision (CV) algorithms have been extensively used for a myriad of applications nowadays. As the multimedia data are generally well-formatted...
-
Manufacturing domain instruction comprehension using synthetic data
Referring expression comprehension (REC) system solves a task to localize objects in a given image, based on natural language expression. We propose...
-
Research on Data-Driven AGC Instruction Execution Effect Recognition Method
With the high penetration of random energy such as wind power and photovoltaic in the power grid, the influence of the accuracy of regulation of... -
Dual-IS: Instruction Set Modality for Efficient Instruction Level Parallelism
Exploiting instruction level parallelism (ILP) is a widely used method for increasing performance of processors. While traditional very long... -
Types of teacher-AI collaboration in K-12 classroom instruction: Chinese teachers’ perspective
The advancing power and capabilities of artificial intelligence (AI) have expanded the roles of AI in education and have created the possibility for...
-
Parallel pairwise operations on data stored in DNA: sorting, XOR, shifting, and searching
Prior research has introduced the Single-Instruction-Multiple-Data paradigm for DNA computing (SIMD DNA). It offers the potential for storing...
-
Using FPGA-based content-addressable memory for mnemonics instruction searching in assembler design
Memories play an essential role in computer systems as they store and retrieve data that may include instructions required for system operation. In...
-
Influence of blended instruction on students’ learning effectiveness: the role of Flow
The rapid development and extensive application of information and communication technologies has facilitated blended instruction, which is regarded...
-
Research on Instruction Pipeline Optimization Oriented to RISC-V Vector Instruction Set
Traditional general-purpose processors are scalar processors, and only one data result is obtained when an instruction is executed. But nowadays,... -
Evaluation of Students’ Performance with Facial Capture Avatars in Online English Instruction
This article evaluates the possibility of deploying virtual avatars on personal devices in online English instruction, as well as the impact on... -
Aspect based sentiment analysis with instruction tuning and external knowledge enhanced dependency graph
AbstractAspect-Based Sentiment Analysis (ABSA) is generally defined as a fine-grained task in Natural Language Processing (NLP). Recently, the...
-
How to Share Medical Data Belonging to Multiple Owners in a Secure Manner
Over the past few years, we have witnessed that the big data analysis technologies based on machine learning and deep learning have brought great... -
A buffer overflow detection and defense method based on RISC-V instruction set extension
Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by...
-
kNN Join for Dynamic High-Dimensional Data: A Parallel Approach
The k nearest neighbor (kNN) join operation is a fundamental task that combines two high-dimensional databases, enabling data points in the User... -
University students experience the COVID-19 induced shift to remote instruction
The COVID-19 pandemic required an abrupt shift from face-to-face to online instruction for many students in higher education in the United States....
-
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph
At present, the trend of familiarization of malicious code is becoming more and more obvious, and the research on the homology of malware (the...
-
Real-time instruction-level verification of remote IoT/CPS devices via side channels
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have become widely deployed in critical infrastructure,...
-
Main memory controller with multiple media technologies for big data workloads
SRAM and DRAM memory technologies have been dominant in the implementations of memory subsystems. In recent years, and mainly driven by the huge...