RL

187 records found

Authored

Design for a TCP/IP transparent FPGA-based network diode

To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?

The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with dis ...

Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...

Population Step Forward Encoding Algorithm

Improving the signal encoding accuracy and efficiency of spike encoding algorithms

Conversion from digital information to spike trains is needed for Spiking Neural Networks. Moreover, it is one of the most important steps for Spiking Neural Networks. This conversion could lead to much information loss depending on which encoding algorithm is used. Another major ...

N-shot Training Methodology

For Spiking Neural Networks(SNNs)

Traditional Artificial Neural Networks(ANNs)like CNNs have shown tremendous opportunities in various domains like autonomous cars, disease diagnosis, etc. Proven learning algorithms like backpropagation help ANNs in achieving higher accuracy. But there is a serious challenge with ...
This thesis proposes a low-cost high-efficiency source-synchronous interface for high-speed inter-chip communication. The interface is composed of LVDS transceivers as external I/O buffers, and an all-digital data recovery, which can calibrate the received data phase to be aligne ...

ρ-VEX ASIC

The Design of an ASIC for a Dynamically Reconfigurable VLIW Processor with 24-port Register File

The ρ-VEX is a runtime reconfigurable VLIW processor. It is able to exploit both ILP as well as TLP by running one program in multiple lanes, or several programs concurrently. To accurately quantify its performance compared to other processors, it is implemented as an IC.
A f ...

Contributed

Design for a TCP/IP transparent FPGA-based network diode

To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?

The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with dis ...

Design for a TCP/IP transparent FPGA-based network diode

To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?

The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with dis ...

Design for a TCP/IP transparent FPGA-based network diode

To what extent is it possible to implement a network diode on an FPGA under realistic network environments, using the Transmission Control Protocol?

The urgency for high-security products for industrial networks is increasing as malicious hackers are improving their accessibility tools. A common practice for a company to protect its sensitive data is network segmentation. The network is segmented in different domains with dis ...

Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...

Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...

Some server hosters facilitate cyber crime either intentionally (so called “bulletproof hosters”) or unintentionally (“bad hosters”). When dealing with uncooperative hosters during forensic investigations, it may sometimes be necessary to collect data or info ...

Population Step Forward Encoding Algorithm

Improving the signal encoding accuracy and efficiency of spike encoding algorithms

Conversion from digital information to spike trains is needed for Spiking Neural Networks. Moreover, it is one of the most important steps for Spiking Neural Networks. This conversion could lead to much information loss depending on which encoding algorithm is used. Another major ...

Population Step Forward Encoding Algorithm

Improving the signal encoding accuracy and efficiency of spike encoding algorithms

Conversion from digital information to spike trains is needed for Spiking Neural Networks. Moreover, it is one of the most important steps for Spiking Neural Networks. This conversion could lead to much information loss depending on which encoding algorithm is used. Another major ...

Physical Characterization of Asynchronous Logic Library

A Design of AER Transmitter and Its Characterization and Back-end Design Flow

Neuromorphic electronic systems have used asynchronous logic combined with continuous-time analog circuits to emulate neurons, synapses, and learning algorithms. It is attractive because of its low power consumption and feasible implementation. Typically, the neuron firing rates ...

N-shot Training Methodology

For Spiking Neural Networks(SNNs)

Traditional Artificial Neural Networks(ANNs)like CNNs have shown tremendous opportunities in various domains like autonomous cars, disease diagnosis, etc. Proven learning algorithms like backpropagation help ANNs in achieving higher accuracy. But there is a serious challenge with ...

N-shot Training Methodology

For Spiking Neural Networks(SNNs)

Traditional Artificial Neural Networks(ANNs)like CNNs have shown tremendous opportunities in various domains like autonomous cars, disease diagnosis, etc. Proven learning algorithms like backpropagation help ANNs in achieving higher accuracy. But there is a serious challenge with ...
This thesis proposes a low-cost high-efficiency source-synchronous interface for high-speed inter-chip communication. The interface is composed of LVDS transceivers as external I/O buffers, and an all-digital data recovery, which can calibrate the received data phase to be aligne ...

ρ-VEX ASIC

The Design of an ASIC for a Dynamically Reconfigurable VLIW Processor with 24-port Register File

The ρ-VEX is a runtime reconfigurable VLIW processor. It is able to exploit both ILP as well as TLP by running one program in multiple lanes, or several programs concurrently. To accurately quantify its performance compared to other processors, it is implemented as an IC.
A f ...

ρ-VEX ASIC

The Design of an ASIC for a Dynamically Reconfigurable VLIW Processor with 24-port Register File

The ρ-VEX is a runtime reconfigurable VLIW processor. It is able to exploit both ILP as well as TLP by running one program in multiple lanes, or several programs concurrently. To accurately quantify its performance compared to other processors, it is implemented as an IC.
A f ...