Claws: Contrastive learning with hard attention and weak supervision
Learning effective visual representations without human supervision is a long-standing
problem in computer vision. Recent advances in self-supervised learning algorithms have …
problem in computer vision. Recent advances in self-supervised learning algorithms have …
[PDF][PDF] Security based approach of SHA 384 and SHA 512 algorithms in cloud environment
T Velmurugan, S Karthiga - J Comput Sci, 2020 - researchgate.net
Cloud computing is going to be the next big thing in the era of internet world. As the world
moves ahead towards enhancement of the cloud features we also have to take a serious …
moves ahead towards enhancement of the cloud features we also have to take a serious …
An FPGA implementation of SipHash
B Welte, J Zambreno - 2023 IEEE International Parallel and …, 2023 - ieeexplore.ieee.org
Cryptographic hash functions play a critical role in ensuring the security and veracity of
network transactions; for example, they constitute the backbone of hash-based message …
network transactions; for example, they constitute the backbone of hash-based message …
[PDF][PDF] Основные тенденции развития архитектур специализированных многоядерных процессоров
ГС Елизаров, ВВ Корнеев, ИЕ Тарасов… - Известия высших …, 2018 - ivuz-e.ru
The power consumption in the up-to-date integrated circuits is significantly determined by
the length of conductors delivering the instructions and the data to functional devices. This …
the length of conductors delivering the instructions and the data to functional devices. This …
[PDF][PDF] SHA-512 Based Wireless Authentication Scheme for Smart Grid Battery Management Systems
A Al Khas, I Cicek - scholar.archive.org
Modern cyber-physical systems depend on the battery backup systems for continuous
service. Due to excessive wiring requirements, the traditional methods used for battery …
service. Due to excessive wiring requirements, the traditional methods used for battery …
[PDF][PDF] Reconfigurable FPGA Architecture for Cryptographic Hashing Algorithms
M Madhukar, DN Nagesh Kumar, H MC, C BM, R Kajol - researchgate.net
Nowadays, security is the most significant thing in the communication field. Most of the data
transmitted over the communication channel are highly confidential so it needs more …
transmitted over the communication channel are highly confidential so it needs more …