To see the other types of publications on this topic, follow the link: Computer architecture.

Journal articles on the topic 'Computer architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Attya, Salih Mahmoud, Suhad Qasim G. Haddad, Hamid Kareem Radam Al-Zaidi, Wafaa Mustafa Hameed, and Nabaa Latif. "Quantum Computing Impact on Traditional Computer Architecture Models." Radioelectronics. Nanosystems. Information Technologies. 16, no. 5 (2024): 691–704. http://dx.doi.org/10.17725/j.rensit.2024.16.691.

Full text
Abstract:
Background: Traditional computer architectures are based on classical computational techniques, challenged by rapid advances in quantum computing. Quantum computers use quantum bits (qubits) to do calculations at speeds unreachable by classical computers, possibly revolutionizing many fields by providing exponential improvements in processing power. Objective: The article aims to investigate the potential consequences of quantum computing on traditional computer architectural models, emphasizing integration issues and transformative powers. Methods: We conducted extensive literature reviews an
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Amit Kumar, and Geeta Chhabra Gandhi. "Computer Architecture." International Journal of Smart Security Technologies 7, no. 1 (2020): 41–48. http://dx.doi.org/10.4018/ijsst.2020010103.

Full text
Abstract:
It is a well-known fact that the expansion of Internet has given rise to many daily activities which are being done online including financial and personal data transactions which has developed the need of security like never before. It has made people realize that the data on the internet must be secured as many types of attacks are increasing day by day with the advancement of technology. So, here the requirement is to ensure that the services are supplied to a legitimate user rather than bots to prevent service abuse. The present article provides such a security from bots with the help of a
APA, Harvard, Vancouver, ISO, and other styles
3

Chien, Andrew A. "Computer architecture." Communications of the ACM 61, no. 9 (2018): 5. http://dx.doi.org/10.1145/3243136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tabak, Daniel. "Computer Architecture." Microprocessors and Microsystems 14, no. 10 (1990): 676. http://dx.doi.org/10.1016/0141-9331(90)90043-u.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yan, and Jun Hui Zheng. "A Well Modularized Computer Network Architecture." Applied Mechanics and Materials 631-632 (September 2014): 902–5. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.902.

Full text
Abstract:
By analyzing a variety of computer network architectures, we can find that researchers establish different computer network models from their different starting points and get different computer network architectures by different modularization methods. We establish a well modularized non-layered computer network architecture. This paper compares it with the layered architecture and obtains a conclusion that it is superior to the layered architecture. We have developed two framework prototypes of it. In the one of them we develop some application softwares of TCP/IP, including E-mail, FTP, Web
APA, Harvard, Vancouver, ISO, and other styles
6

Odhiambo, M. O., and P. O. Umenne. "NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce." Engineering, Technology & Applied Science Research 2, no. 6 (2012): 302–9. http://dx.doi.org/10.48084/etasr.145.

Full text
Abstract:
Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to
APA, Harvard, Vancouver, ISO, and other styles
7

Mathew, Jincy C. "Review on Architecture of Computer Networks." International Journal of Psychosocial Rehabilitation 24, no. 4 (2020): 6997–7001. http://dx.doi.org/10.37200/ijpr/v24i5/pr2020702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dong, Xia, Shou Quan Wang, Xin Zhang, and Xiao Jia Ji. "Software Radar Hardware Architecture Based on General Computer." Advanced Materials Research 846-847 (November 2013): 207–10. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.207.

Full text
Abstract:
For software radar, different functions are realized by software running on standard hardware platform, which brings to great predominance over traditional radar. In this paper, realizable structure of software radar was analyzed, and hardware platform based on computer was studied. Two hardware architectures, one-computer architecture as well as computer cluster architecture were raised based on computer. The one-computer architecture is available to radars that cubage is restricted, while computer cluster architecture is applied in huge radar with complex computation.
APA, Harvard, Vancouver, ISO, and other styles
9

Kaiser, Marcus. "Brain architecture: a design for natural computation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 365, no. 1861 (2007): 3033–45. http://dx.doi.org/10.1098/rsta.2007.0007.

Full text
Abstract:
Fifty years ago, John von Neumann compared the architecture of the brain with that of the computers he invented and which are still in use today. In those days, the organization of computers was based on concepts of brain organization. Here, we give an update on current results on the global organization of neural systems. For neural systems, we outline how the spatial and topological architecture of neuronal and cortical networks facilitates robustness against failures, fast processing and balanced network activation. Finally, we discuss mechanisms of self-organization for such architectures.
APA, Harvard, Vancouver, ISO, and other styles
10

Clements, A. "Computer architecture education." Microprocessors and Microsystems 23, no. 5 (1999): 255–56. http://dx.doi.org/10.1016/s0141-9331(99)00020-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Clements, A. "Computer architecture education." IEEE Micro 20, no. 3 (2000): 10–12. http://dx.doi.org/10.1109/mm.2000.846304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bhatt, Dulari, Chirag Patel, Hardik Talsania, et al. "CNN Variants for Computer Vision: History, Architecture, Application, Challenges and Future Scope." Electronics 10, no. 20 (2021): 2470. http://dx.doi.org/10.3390/electronics10202470.

Full text
Abstract:
Computer vision is becoming an increasingly trendy word in the area of image processing. With the emergence of computer vision applications, there is a significant demand to recognize objects automatically. Deep CNN (convolution neural network) has benefited the computer vision community by producing excellent results in video processing, object recognition, picture classification and segmentation, natural language processing, speech recognition, and many other fields. Furthermore, the introduction of large amounts of data and readily available hardware has opened new avenues for CNN study. Se
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Xinyu, Vincent C. S. Lee, Jia Rong, Feng Liu, and Haoyu Kong. "Multi-channel convolutional neural network architectures for thyroid cancer detection." PLOS ONE 17, no. 1 (2022): e0262128. http://dx.doi.org/10.1371/journal.pone.0262128.

Full text
Abstract:
Early detection of malignant thyroid nodules leading to patient-specific treatments can reduce morbidity and mortality rates. Currently, thyroid specialists use medical images to diagnose then follow the treatment protocols, which have limitations due to unreliable human false-positive diagnostic rates. With the emergence of deep learning, advances in computer-aided diagnosis techniques have yielded promising earlier detection and prediction accuracy; however, clinicians’ adoption is far lacking. The present study adopts Xception neural network as the base structure and designs a practical fra
APA, Harvard, Vancouver, ISO, and other styles
14

Jamieson, Peter, Huan Le, Nathan Martin, et al. "Computer Engineering Education Experiences with RISC-V Architectures—From Computer Architecture to Microcontrollers." Journal of Low Power Electronics and Applications 12, no. 3 (2022): 45. http://dx.doi.org/10.3390/jlpea12030045.

Full text
Abstract:
With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this simple and relevant architecture, and also, these students can explore and design a microcontroller at a low-level using real tool-flows and implement and test their hardware. In this work, we describe our experiences with undergraduate engineers building RISC-V architectures on an FPGA and then extending their experiences to implement an Arduino-like RISC-V tool-flow and the respective hardware and software to handle input-output ports, i
APA, Harvard, Vancouver, ISO, and other styles
15

Çelik, Tuğçe. "Unknown interiors of ancient Egypt: producing by artificial intelligence in the context of light-space relationship." JOURNAL OF ARCHITECTURE AND URBANISM 49, no. 1 (2025): 1–10. https://doi.org/10.3846/jau.2025.21202.

Full text
Abstract:
This study presents a design method aimed at visualizing cultural heritage through the architecture of ancient Egypt using modern technologies. With the deepening of the digital age, the use of digital technology and artificial intelligence in cultural heritage research has become an important tool for renewing and disseminating period architecture. The reason for choosing the interior spaces of ancient Egypt as a sample in this study is that, in addition to leaving a rich heritage in the field of architecture, ancient Egypt offers distinct period architecture in terms of space-light relations
APA, Harvard, Vancouver, ISO, and other styles
16

Schmidt, Anne Marie Due, and Poul Henning Kirkegaard. "From Architectural Acoustics to Acoustical Architecture Using Computer Simulation." Building Acoustics 12, no. 2 (2005): 85–98. http://dx.doi.org/10.1260/1351010054037965.

Full text
Abstract:
Architectural acoustics design has in the past been based on simple design rules. However, with a growing complexity in architectural acoustics and the emergence of room acoustic simulation programmes with considerable potential, it is now possible to subjectively analyse and evaluate acoustic properties prior to the actual construction of a building. With the right tools applied, acoustic design can become an integral part of the architectural design process. The aim of this paper is to investigate the field of application that an acoustic simulation programme can have during an architectural
APA, Harvard, Vancouver, ISO, and other styles
17

Ahmad, Othman. "FPGA BASED INDIVIDUAL COMPUTER ARCHITECTURE LABORATORY EXERCISES." Journal of BIMP-EAGA Regional Development 3, no. 1 (2017): 23–31. http://dx.doi.org/10.51200/jbimpeagard.v3i1.1026.

Full text
Abstract:
Computer Architecture is the study of digital computers towards designing, building and operating digital computers. Digital computers are vital for the modern living because they are essential in providing the intelligences in devices such as self-driving cars and smartphones. Computer Architecture is a core subject for the Electronic (Computer) Engineering course at the Universiti Malaysia Sabah that is compliant to the requirement of the Washington Accord as accredited by the Engineering Accreditation Council of the Board of Engineers of Malaysia (EAC). An FPGA (Field Programmable Gate Arra
APA, Harvard, Vancouver, ISO, and other styles
18

AKL, SELIM G. "THREE COUNTEREXAMPLES TO DISPEL THE MYTH OF THE UNIVERSAL COMPUTER." Parallel Processing Letters 16, no. 03 (2006): 381–403. http://dx.doi.org/10.1142/s012962640600271x.

Full text
Abstract:
It is shown that the concept of a Universal Computer cannot be realized. Specifically, instances of a computable function [Formula: see text] are exhibited that cannot be computed on any machine [Formula: see text] that is capable of only a finite and fixed number of operations per step. This remains true even if the machine [Formula: see text] is endowed with an infinite memory and the ability to communicate with the outside world while it is attempting to compute [Formula: see text]. It also remains true if, in addition, [Formula: see text] is given an indefinite amount of time to compute [F
APA, Harvard, Vancouver, ISO, and other styles
19

Ramancha, Nitesh Kumar. "Evaluation of Computer Architecture and Organization using the SPSS Method." International Journal of Cloud Computing and Supply Chain Management 1, no. 1 (2025): 13–24. https://doi.org/10.55124/ijccsm.v1i1.233.

Full text
Abstract:
The process of creating a computer's internal structure and layout, as well as the electronic components' interactions with one another, is referred to as computer architecture design. It entails making choices about the architectural of the entire system as well as the CPU, memory hierarchy, input/output (I/O) systems, and memory hierarchy. (ISA) Instruction Set Architecture The interface that exists between software and computer hardware is described by ISA. It contains the set of instructions the CPU is capable of processing, the addressing modes, and the register structure. The ISA decisio
APA, Harvard, Vancouver, ISO, and other styles
20

Medvidovic, Nenad, Eric M. Dashofy, and Richard N. Taylor. "The Role of Middleware in Architecture-Based Software Development." International Journal of Software Engineering and Knowledge Engineering 13, no. 04 (2003): 367–93. http://dx.doi.org/10.1142/s0218194003001330.

Full text
Abstract:
Software architectures promote development focused on modular functional building blocks (components), their interconnections (configurations), and their interactions (connectors). Since architecture-level components often contain complex functionality, it is reasonable to expect that their interactions will be complex as well. Middleware technologies such as CORBA, COM, and RMI provide a set of predefined services for enabling component composition and interaction. However, the potential role of such services in the implementations of software architectures is not well understood. In practice
APA, Harvard, Vancouver, ISO, and other styles
21

Ossama MOHAMED al-Rawi, Ossama. "Origins of Computational Design in Architecture." Future Engineering Journal 1, no. 1 (2020): 1–9. http://dx.doi.org/10.54623/fue.fej.1.1.5.

Full text
Abstract:
The changes that the computer is bringing to architecture are one part of a revolutionary social upheaval. Tools not only change individual patterns and behaviour, but also cause transformations in institutions. Just as other tools have in the past, the computer is in the process of conditioning our understanding of the world and our perception of our place in it. The application of computers to architecture is more than anew sophisticated tool that can be manipulated like a pencil or pen. It is rather, “the culmination of the objectifying mentality of modernity and it is, therefore, inherentl
APA, Harvard, Vancouver, ISO, and other styles
22

PAHL, CLAUS, YAOLING ZHU, and VERONICA GACITUA-DECAR. "A TEMPLATE-DRIVEN APPROACH FOR MAINTAINABLE SERVICE-ORIENTED INFORMATION SYSTEMS INTEGRATION." International Journal of Software Engineering and Knowledge Engineering 19, no. 07 (2009): 889–912. http://dx.doi.org/10.1142/s0218194009004465.

Full text
Abstract:
Service-oriented architecture (SOA) is currently the predominant software integration framework. Web services provide the predominant platform for SOA. SOA as an integration architecture solution supports a range of application scenarios. We present a solution for the integration of business information systems based on SOA and Web services. We discuss maintainability requirements in relation to information-specific integration and architecture aspects. A template-based approach based on modular and declarative transformation rules and architectural styles and patterns defines our solution to
APA, Harvard, Vancouver, ISO, and other styles
23

Driker, Benjamin. "Disbursed control computer architecture." ACM SIGARCH Computer Architecture News 27, no. 3 (1999): 24–31. http://dx.doi.org/10.1145/333680.333695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ma, K. "Review: Computer Systems Architecture." Computer Bulletin 46, no. 5 (2004): 31. http://dx.doi.org/10.1093/combul/46.5.31-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wulf, Wm A. "The WM computer architecture." ACM SIGARCH Computer Architecture News 16, no. 1 (1988): 70–84. http://dx.doi.org/10.1145/44571.44577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Torrellas, Josep. "Extreme-scale computer architecture." National Science Review 3, no. 1 (2016): 19–23. http://dx.doi.org/10.1093/nsr/nwv085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Dorsey, Julie, and Leonard McMillan. "Computer graphics and architecture." ACM SIGGRAPH Computer Graphics 32, no. 1 (1998): 45–48. http://dx.doi.org/10.1145/279389.279449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Pancratov, Cosmin, Jacob M. Kurzer, Kelly A. Shaw, and Matthew L. Trawick. "Why Computer Architecture Matters." Computing in Science & Engineering 10, no. 3 (2008): 59–63. http://dx.doi.org/10.1109/mcse.2008.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cragon, Harvey G. "Computer Architecture and Implementation." Measurement Science and Technology 12, no. 10 (2001): 1744–45. http://dx.doi.org/10.1088/0957-0233/12/10/704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ibbett, R. N. "Computer architecture visualisation techniques." Microprocessors and Microsystems 23, no. 5 (1999): 291–300. http://dx.doi.org/10.1016/s0141-9331(99)00024-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Karafyllidis, Ioannis G. "Cellular quantum computer architecture." Physics Letters A 320, no. 1 (2003): 35–38. http://dx.doi.org/10.1016/j.physleta.2003.11.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bhuyan, Laxmi N. "High-performance computer architecture." Future Generation Computer Systems 11, no. 6 (1995): 501–2. http://dx.doi.org/10.1016/0167-739x(95)00020-s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kammerer-Luka, G. "Architecture — related computer art." Visual Computer 2, no. 3 (1986): 187–88. http://dx.doi.org/10.1007/bf01900337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hunt, Ray. "Computer architecture and communications." Computer Communications 11, no. 6 (1988): 331. http://dx.doi.org/10.1016/0140-3664(88)90048-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Markettos, A. T., R. N. M. Watson, S. W. Moore, P. Sewell, and P. G. Neumann. "Through computer architecture, darkly." Communications of the ACM 62, no. 6 (2019): 25–27. http://dx.doi.org/10.1145/3325284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Stojcev, M. "Computer Organization and Architecture." Microelectronics Journal 31, no. 5 (2000): 375–76. http://dx.doi.org/10.1016/s0026-2692(99)00155-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Clements, Alan. "High-performance computer architecture." Microprocessors and Microsystems 13, no. 1 (1989): 63. http://dx.doi.org/10.1016/0141-9331(89)90038-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Clements, Alan. "Computer architecture and design." Microprocessors and Microsystems 14, no. 1 (1990): 62. http://dx.doi.org/10.1016/0141-9331(90)90017-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sorin, Daniel J. "Fault Tolerant Computer Architecture." Synthesis Lectures on Computer Architecture 4, no. 1 (2009): 1–104. http://dx.doi.org/10.2200/s00192ed1v01y200904cac005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Konyavsky, Valery A., and Gennady V. Ross. "COMPUTER WITH CHANGEABLE ARCHITECTURE." Journal of Mechanical Engineering Research and Developments 42, no. 3 (2019): 19–23. http://dx.doi.org/10.26480/jmerd.03.2019.19.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Anderson, Noel W. "Amorphous computer system architecture." ACM SIGARCH Computer Architecture News 18, no. 1 (1990): 51. http://dx.doi.org/10.1145/379126.379133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Schoeberl, Martin. "Time-Predictable Computer Architecture." EURASIP Journal on Embedded Systems 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/758480.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ibbett, Roland N., J. C. Diaz y Carballo, and D. A. W. Dolman. "Computer architecture simulation models." ACM SIGCSE Bulletin 38, no. 3 (2006): 353. http://dx.doi.org/10.1145/1140123.1140263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Mirmotahari, Omid, Christian Holmboe, and Jens Kaasbøll. "Difficulties learning computer architecture." ACM SIGCSE Bulletin 35, no. 3 (2003): 247. http://dx.doi.org/10.1145/961290.961606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hill, Mark D. "21st century computer architecture." ACM SIGPLAN Notices 49, no. 8 (2014): 1–2. http://dx.doi.org/10.1145/2692916.2558890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

G.W.A.D. "Computer architecture and design." Microelectronics Reliability 30, no. 1 (1990): 182–83. http://dx.doi.org/10.1016/0026-2714(90)90027-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Tsuchiya, Mas. "Computer hardware/software architecture." Microprocessors and Microsystems 11, no. 4 (1987): 236. http://dx.doi.org/10.1016/0141-9331(87)90383-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Yang, Chia-Lin. "Understanding Computer Architecture Sustainability." Computer 56, no. 9 (2023): 4–5. http://dx.doi.org/10.1109/mc.2023.3290271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Verma, Neena. "Insecurity in architecture." Architectural Research Quarterly 18, no. 2 (2014): 106–9. http://dx.doi.org/10.1017/s1359135514000414.

Full text
Abstract:
‘I myself do not believe in explaining anything’, wrote Shel Silverstein. It seems that architecture is always looking to explain itself. Definitions of architecture seem almost common knowledge; ask a bartender, biologist, computer scientist, economist, legislator, birdwatcher, quilter or scientist, each of whom analogises their field with respect to architecture. And several within the profession can themselves define architecture's limits quite elegantly. Most recently Steven Holl defined architecture as consisting simply of abstract, use, space and idea. However, seeking a rationale or exp
APA, Harvard, Vancouver, ISO, and other styles
50

Gudhka, Drashti. "Computer Network." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 78–87. http://dx.doi.org/10.22214/ijraset.2024.57862.

Full text
Abstract:
Abstract: This paper presents a comprehensive overview of computer networking, covering fundamental concepts and modern advancements. It explores core networking principles, including models, architectures, and essential layers. Emphasising contemporary trends, it delves into topics like network security (Zero Trust Architecture, AI/ML), Software-Defined Networking (SDN), IoT security challenges, 5G and Mobile Edge Computing (MEC), network performance optimisation, Big Data analytics, and eco-friendly networking strategies. Aimed at students, researchers, and professionals, this overview serve
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!