We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Field Instruction Multiple Data

    Fully homomorphic encryption (FHE) has flourished since it was first constructed by Gentry (STOC 2009). Single instruction multiple data (SIMD) gave...
    Khin Mi Mi Aung, Enhui Lim, ... Sze Ling Yeo in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  2. The effect of student engagement strategies in online instruction for data management skills

    Evaluating the effectiveness of teaching methods for synchronous online instruction is integral to fostering student engagement and maximizing...

    Zhihong Xu, Xuan Zhou, ... Ashlynn Kogut in Education and Information Technologies
    Article 24 January 2023
  3. Evaluating RISC-V Vector Instruction Set Architecture Extension with Computer Vision Workloads

    Computer vision (CV) algorithms have been extensively used for a myriad of applications nowadays. As the multimedia data are generally well-formatted...

    Ruo-Shi Li, ** Peng, ... Ran Zheng in Journal of Computer Science and Technology
    Article 31 July 2023
  4. Manufacturing domain instruction comprehension using synthetic data

    Referring expression comprehension (REC) system solves a task to localize objects in a given image, based on natural language expression. We propose...

    Kritika Johari, Christopher Tay Zi Tong, ... U.-Xuan Tan in The Visual Computer
    Article 27 January 2024
  5. Research on Data-Driven AGC Instruction Execution Effect Recognition Method

    With the high penetration of random energy such as wind power and photovoltaic in the power grid, the influence of the accuracy of regulation of...
    Haiyang Jiang, Hongtong Liu, Yangfei Zhang in Big Data and Security
    Conference paper 2023
  6. Dual-IS: Instruction Set Modality for Efficient Instruction Level Parallelism

    Exploiting instruction level parallelism (ILP) is a widely used method for increasing performance of processors. While traditional very long...
    Kari Hepola, Joonas Multanen, Pekka Jääskeläinen in Architecture of Computing Systems
    Conference paper 2022
  7. Types of teacher-AI collaboration in K-12 classroom instruction: Chinese teachers’ perspective

    The advancing power and capabilities of artificial intelligence (AI) have expanded the roles of AI in education and have created the possibility for...

    Article Open access 23 February 2024
  8. Parallel pairwise operations on data stored in DNA: sorting, XOR, shifting, and searching

    Prior research has introduced the Single-Instruction-Multiple-Data paradigm for DNA computing (SIMD DNA). It offers the potential for storing...

    Arnav Solanki, Tonglin Chen, Marc Riedel in Natural Computing
    Article 21 September 2023
  9. Using FPGA-based content-addressable memory for mnemonics instruction searching in assembler design

    Memories play an essential role in computer systems as they store and retrieve data that may include instructions required for system operation. In...

    Halit Ă–ztekin, Abdelkader Lazzem, Ä°hsan Pehlivan in The Journal of Supercomputing
    Article 07 May 2023
  10. Influence of blended instruction on students’ learning effectiveness: the role of Flow

    The rapid development and extensive application of information and communication technologies has facilitated blended instruction, which is regarded...

    Qing Tang, Tao Zhang, Lixia Jiang in Education and Information Technologies
    Article 08 August 2022
  11. Research on Instruction Pipeline Optimization Oriented to RISC-V Vector Instruction Set

    Traditional general-purpose processors are scalar processors, and only one data result is obtained when an instruction is executed. But nowadays,...
    Conference paper 2022
  12. Evaluation of Students’ Performance with Facial Capture Avatars in Online English Instruction

    This article evaluates the possibility of deploying virtual avatars on personal devices in online English instruction, as well as the impact on...
    Yu Qiu, Gang Wang, Qianxi Zhang in Computer Science and Education. Teaching and Curriculum
    Conference paper 2024
  13. Aspect based sentiment analysis with instruction tuning and external knowledge enhanced dependency graph

    Abstract

    Aspect-Based Sentiment Analysis (ABSA) is generally defined as a fine-grained task in Natural Language Processing (NLP). Recently, the...

    Xuefeng Shi, Min Hu, ... Satoshi Nakagawa in Applied Intelligence
    Article 01 April 2024
  14. How to Share Medical Data Belonging to Multiple Owners in a Secure Manner

    Over the past few years, we have witnessed that the big data analysis technologies based on machine learning and deep learning have brought great...
    Changsheng Zhao, Wei Song, Zhiyong Peng in Web and Big Data
    Conference paper 2023
  15. A buffer overflow detection and defense method based on RISC-V instruction set extension

    Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by...

    Chang Liu, Yan-Jun Wu, ... Chen Zhao in Cybersecurity
    Article Open access 06 September 2023
  16. kNN Join for Dynamic High-Dimensional Data: A Parallel Approach

    The k nearest neighbor (kNN) join operation is a fundamental task that combines two high-dimensional databases, enabling data points in the User...
    Nimish Ukey, Zhengyi Yang, ... Runze Li in Databases Theory and Applications
    Conference paper 2024
  17. University students experience the COVID-19 induced shift to remote instruction

    The COVID-19 pandemic required an abrupt shift from face-to-face to online instruction for many students in higher education in the United States....

    Article Open access 17 November 2021
  18. AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph

    At present, the trend of familiarization of malicious code is becoming more and more obvious, and the research on the homology of malware (the...

    Runzheng Wang, Jian Gao, Shuhua Huang in International Journal of Information Security
    Article 14 May 2023
  19. Real-time instruction-level verification of remote IoT/CPS devices via side channels

    In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have become widely deployed in critical infrastructure,...

    Yunkai Bai, Jungmin Park, ... Domenic Forte in Discover Internet of Things
    Article Open access 17 March 2022
  20. Main memory controller with multiple media technologies for big data workloads

    SRAM and DRAM memory technologies have been dominant in the implementations of memory subsystems. In recent years, and mainly driven by the huge...

    Miguel A. Avargues, Manel Lurbe, ... Julio Sahuquillo in Journal of Big Data
    Article Open access 22 May 2023
Did you find what you were looking for? Share feedback.