Academic literature on the topic 'Runtime resilient soc'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Runtime resilient soc.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Runtime resilient soc"

1

Avani, Dave, and Dave Krunal. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.13337765.

Full text
Abstract:
The advancement of industrial 4.0 has increased the utilization of resource constrained embedded and IOT devices in application ranging from Internet of Things (<em>IoT</em>) and CyberPhysical Systems (<em>CPS</em>). These systems are often involve in security-critical user data and/or information transfers. This makes them increasingly popular target for attacks to gain access of security-critical user data and/or information. The resiliency of a system is defined by its ability to detect, prevent and recover from the attacks. Crypto primitives such as secure boot, attestation, TPM, control f
APA, Harvard, Vancouver, ISO, and other styles
2

Krunal, Dave, and Dave Avani. "Survey of attack resilient embedded systems design." Journal of Scientific and Engineering Research 7, no. 12 (2020): 242–49. https://doi.org/10.5281/zenodo.12772515.

Full text
Abstract:
The advancement of industrial 4.0 has increased the utilization of resource constrained embedded and IOT devices in application ranging from Internet of Things (<em>IoT</em>) and CyberPhysical Systems (<em>CPS</em>). These systems are often involve in security-critical user data and/or information transfers. This makes them increasingly popular target for attacks to gain access of security-critical user data and/or information. The resiliency of a system is defined by its ability to detect, prevent and recover from the attacks. Crypto primitives such as secure boot, attestation, TPM, control f
APA, Harvard, Vancouver, ISO, and other styles
3

Casas, Marc, Wilfried N. Gansterer, and Elias Wimmer. "Resilient gossip-inspired all-reduce algorithms for high-performance computing: Potential, limitations, and open questions." International Journal of High Performance Computing Applications 33, no. 2 (2018): 366–83. http://dx.doi.org/10.1177/1094342018762531.

Full text
Abstract:
We investigate the usefulness of gossip-based reduction algorithms in a high-performance computing (HPC) context. We compare them to state-of-the-art deterministic parallel reduction algorithms in terms of fault tolerance and resilience against silent data corruption (SDC) as well as in terms of performance and scalability. New gossip-based reduction algorithms are proposed, which significantly improve the state-of-the-art in terms of resilience against SDC. Moreover, a new gossip-inspired reduction algorithm is proposed, which promises a much more competitive runtime performance in an HPC con
APA, Harvard, Vancouver, ISO, and other styles
4

Zhong, Yunshun, and Tamer El-Diraby. "Shoreline Recognition Using Machine Learning Techniques." IOP Conference Series: Earth and Environmental Science 1101, no. 2 (2022): 022025. http://dx.doi.org/10.1088/1755-1315/1101/2/022025.

Full text
Abstract:
Abstract Coastal areas have emerged to be the most significant and dynamic regions worldwide. Therefore, automating shoreline recognition will aid non-profit conservation authorities to reduce public budget expenditures, relieve erosion damage, and increase the climate resilience of the natural environment. In this paper, advanced ML boosting algorithms including XGBoost, and LGBM are firstly applied into shoreline recognition with aerial images (of Lake Ontario in this study). This paper first discussed the significance and a literature review of recent progress in shoreline detection. Then,
APA, Harvard, Vancouver, ISO, and other styles
5

Thota, Ravi Chandra. "Enhancing Infrastructure as Code (IaC) with Automated Validation for Reliable and Error-Free Deployments." Journal of Artificial Intelligence Research and Applications 4, no. 1 (2024): 827–47. https://doi.org/10.5281/zenodo.15078796.

Full text
Abstract:
Abstract: Infrastructure as Code (IaC)Is turned out to be a transformative practise in modern software deployment and system managementwhich allows automation and consistency across development and production environment. Despitepromise for deficient and scalable deployments, IaChas inbuilt challenge specially related to the potential for human error and difficulty to ensure reliability and correctness of configuration. The aim of this research paper is to explore the integration of automated validation technique into IaC workflow which canenhance the reliability and accuracy of infrastructure
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!