Items where Subject is "G411 Computer Architectures"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Keywords | Item Type
Allen’s time interval Architecture Architecture and philosophy Architectures Binary Patterns Boolean functions Boolean logic Business process Business-Model CMOS cryptographic circuit security CMOS integrated circuits CMOS logic circuits CMOS technology Ciphers Clocks Cloud Computing Cloud computing Cloud-edge coupling Cognitive Computing Cognitive Fog Computing Communications Composition Computer architecture Computer science Computer systems organization Computers Cybernetics Dependency Design Distributed architectures Dystopia Edge computing EdgeCloudSim Electronic computers. Computer science Embedded system Emergency services FPGA Fault tolerance Federation Federation-as-a-Service Fog Comptugin Fog Computing Fog Computing Resources Fog computing Fog computing for healthcare Human-computer interfaces Information Architecture Integrated circuit modeling Internet Internet of Things Internet of Things (IoT) Internet-of-Things IoT Logic functions Manufacturing Offloading Permission Philosophy Power demand Power dissipation QCA QCA cryptographic circuits Quality of Protection Quality of Service Quantum dots Resource Resource management Review S-box Serpent cipher Serpent submodule SoC Software Complexity Software Development Software design models Television documentary Thing Federation Trust Upper bound Utopia Utopian space WWW World Wide Web bSOM binary SOM cellular automata character recognition computer mediated communication computer vision cryptography decryption process defect tolerance digital digital designs encryption process fog-2-fog collaboration hybrid nano/CMOS hybrid nano/CMOS computing architecture identification technology logic circuit logic circuits logic gates logically reversible QCA circuit design lookup-table low power consumption nanoelectronics object recognition power analysis attack quantum dots quantum-dot cellular automata (QCA) power model quantum-dot cellular automata technology reliability repair techniques review side channel attacks table lookup tagged repair upper bound power model world wide web www
Number of items at this level: 157.

Allen’s time interval

Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605

Architecture

Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

Architecture and philosophy

Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .

Architectures

Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.

Binary Patterns

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.

Boolean functions

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Boolean logic

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Business process

Sellami, Mohamed, Al-Khafajiy, Mohammed, Atif, Yacine, Ugljanin, Emir, Faci, Noura, Baker, Thar and Maamar, Zakaria (2018) Cognitive Computing Meets the Internet of Things. In: 13th International Conference on Software Technologies.

Business-Model

Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.

CMOS cryptographic circuit security

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

CMOS integrated circuits

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

CMOS logic circuits

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

CMOS technology

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Ciphers

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

Clocks

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

Cloud Computing

Al-Khafajiy, Mohammed, Baker, Thar, Waraich, Atif, Al-Jumeily, Dhiya and Hussain, Abir (2019) IoT-Fog Optimal Workload via Fog Offloading. In: IEEE/ACM International Conference on Utility and Cloud Computing Companion.

Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.

Cloud computing

Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.

Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.

Cloud-edge coupling

Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.

Cognitive Computing

Sellami, Mohamed, Al-Khafajiy, Mohammed, Atif, Yacine, Ugljanin, Emir, Faci, Noura, Baker, Thar and Maamar, Zakaria (2018) Cognitive Computing Meets the Internet of Things. In: 13th International Conference on Software Technologies.

Cognitive Fog Computing

Al-Khafajiy, Mohammed, Otoum, Safa, Baker, Thar, Asim, Muhammad, Maamar, Zakaria, Aloqaily, Moayad, Taylor, Mark and Randles, Martin (2021) Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Transactions on Internet Technology, 21 (3). pp. 1-23. ISSN 1533-5399

Communications

Hudson, John (2010) Culture and communication. Digital Imaging and Photography .

Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .

Composition

Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605

Computer architecture

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Computer science

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Computer systems organization

Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.

Computers

Hudson, John (2010) Culture and communication. Digital Imaging and Photography .

Cybernetics

Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .

Dependency

Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605

Design

Hudson, John (2011) Utopias, the cathedral of the new Worlds and the microchip. Digital Imaging and Photography .

Distributed architectures

Maamar, Zakaria and Al-Khafajiy, Mohammed (2021) Cloud-edge coupling to mitigate execution failures. In: 36th Annual ACM Symposium on Applied Computing, March 22 - 26, 2021, Republic of Korea.

Dystopia

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

Edge computing

Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.

EdgeCloudSim

Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605

Electronic computers. Computer science

Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .

Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .

Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .

Hudson, John (2010) Culture and communication. Digital Imaging and Photography .

Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

Embedded system

Meng, Hongying, Freeman, Micheal, Pears, Nick and Bailey, Chris (2008) FPGA implementation of real-time human motion recognition on a reconfigurable video processing architecture. Journal of Real-time Image Processing, 3 (3). pp. 163-176. ISSN 1861-8200

Meng, Hongying, Pears, Nick, Freeman, Michael and Bailey, Chris (2008) Motion history histograms for human action recognition. In: Embedded Computer Vision (Advances in Pattern Recognition). Springer, UK. ISBN 9781848003033

Emergency services

Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.

FPGA

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215

Meng, Hongying, Freeman, Micheal, Pears, Nick and Bailey, Chris (2008) FPGA implementation of real-time human motion recognition on a reconfigurable video processing architecture. Journal of Real-time Image Processing, 3 (3). pp. 163-176. ISSN 1861-8200

Meng, Hongying, Pears, Nick, Freeman, Michael and Bailey, Chris (2008) Motion history histograms for human action recognition. In: Embedded Computer Vision (Advances in Pattern Recognition). Springer, UK. ISBN 9781848003033

Fault tolerance

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Federation

Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X

Federation-as-a-Service

Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.

Fog Comptugin

Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.

Fog Computing

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.

Al-Khafajiy, Mohammed, Baker, Thar, Waraich, Atif, Al-Jumeily, Dhiya and Hussain, Abir (2019) IoT-Fog Optimal Workload via Fog Offloading. In: IEEE/ACM International Conference on Utility and Cloud Computing Companion.

Al-Khafajiy, Mohammed, Webster, Lee, Baker, Thar and Waraich, Atif (2018) Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In: International Conference on Future Networks and Distributed Systems.

Fog Computing Resources

Al-Khafajiy, Mohammed, Otoum, Safa, Baker, Thar, Asim, Muhammad, Maamar, Zakaria, Aloqaily, Moayad, Taylor, Mark and Randles, Martin (2021) Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Transactions on Internet Technology, 21 (3). pp. 1-23. ISSN 1533-5399

Fog computing

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X

Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315

Fog computing for healthcare

Al-Khafajiy, Mohammed, Webster, Lee, Baker, Thar and Waraich, Atif (2018) Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In: International Conference on Future Networks and Distributed Systems.

Human-computer interfaces

Hudson, John (2011) Utopias, the cathedral of the new Worlds and the microchip. Digital Imaging and Photography .

Information Architecture

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

Integrated circuit modeling

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

Internet

Hudson, John (2010) Culture and communication. Digital Imaging and Photography .

Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .

Internet of Things

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X

Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.

Internet of Things (IoT)

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.

Al-Khafajiy, Mohammed, Baker, Thar, Waraich, Atif, Al-Jumeily, Dhiya and Hussain, Abir (2019) IoT-Fog Optimal Workload via Fog Offloading. In: IEEE/ACM International Conference on Utility and Cloud Computing Companion.

Al-Khafajiy, Mohammed, Otoum, Safa, Baker, Thar, Asim, Muhammad, Maamar, Zakaria, Aloqaily, Moayad, Taylor, Mark and Randles, Martin (2021) Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model. ACM Transactions on Internet Technology, 21 (3). pp. 1-23. ISSN 1533-5399

Al-Khafajiy, Mohammed, Webster, Lee, Baker, Thar and Waraich, Atif (2018) Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. In: International Conference on Future Networks and Distributed Systems.

Maamar, Zakaria, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) An IoT Application Business-Model on Top of Cloud and Fog Nodes. In: International Conference on Advanced Information Networking and Applications, 12-14 May, Toronto, ON, Canada.

Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.

Internet-of-Things

Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X

IoT

Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315

Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605

Sellami, Mohamed, Al-Khafajiy, Mohammed, Atif, Yacine, Ugljanin, Emir, Faci, Noura, Baker, Thar and Maamar, Zakaria (2018) Cognitive Computing Meets the Internet of Things. In: 13th International Conference on Software Technologies.

Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X

Logic functions

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Manufacturing

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Offloading

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X

Permission

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

Philosophy

Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .

Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .

Power demand

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

Power dissipation

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

QCA

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

QCA cryptographic circuits

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Quality of Protection

Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315

Quality of Service

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.

Quantum dots

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

Resource

Maamar, Zakaria, Faci, Noura, Al-Khafajiy, Mohammed and Dohan, Murtada (2021) Time-centric and resource-driven composition for the Internet of Things. Internet of Things, 16 . p. 100460. ISSN 2542-6605

Resource management

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Waraich, Atif, Chalmers, Carl and Alfandi, Omar (2019) Fog Computing Framework for Internet of Things Applications. In: International Conference on Developments in eSystems Engineering (DESE), 2-5 Sept. 2018, Cambridge, UK.

Al-Khafajiy, Mohammed, Ghareeb, Shatha, Al-Jumeily, Rawaa, Almurshedi, Rusul, Hussien, Aseel, Baker, Thar and Jararweh, Yaser (2020) A Holistic Study on Emerging IoT Networking Paradigms. In: International Conference on Developments in eSystems Engineering (DESE), 7-10 Oct. 2019, Kazan, Russia.

Review

Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .

S-box

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Serpent cipher

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Serpent submodule

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

SoC

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.

Software Complexity

Kemp, Peter and Mcmanus, John (2009) Whither enterprise architecture? ITNOW Computing Journal, 51 (2). pp. 20-21. ISSN 1746-5702

Software Development

Kemp, Peter and Mcmanus, John (2009) Whither enterprise architecture? ITNOW Computing Journal, 51 (2). pp. 20-21. ISSN 1746-5702

Software design models

Kemp, Peter and Mcmanus, John (2009) Whither enterprise architecture? ITNOW Computing Journal, 51 (2). pp. 20-21. ISSN 1746-5702

Television documentary

Hudson, John (2011) All watched over by machines of loving grace: part 1, "Love and power". Digital Imaging and Photography .

Thing Federation

Maamar, Zakaria, Boukadi, Khouloud, Ugljanin, Emir, Baker, Thar, Asim, Muhammad, Al-Khafajiy, Mohammed, Benslimane, Djamal and El Alaoui El Abdallaoui, Hasna (2018) Thing Federation as a Service: Foundations and Demonstration. In: International Conference on Model and Data Engineering.

Trust

Al-Khafajiy, Mohammed, Baker, Thar, Asim, Muhammad, Guo, Zehua, Ranjan, Rajiv, Longo, Antonella, Puthal, Deepak and Taylor, Mark (2020) COMITMENT: A Fog Computing Trust Management Approach. Journal of Parallel and Distributed Computing, 137 . pp. 1-16. ISSN 0743-7315

Yahyaoui, Hamdi, Maamar, Zakaria, Al-Khafajiy, Mohammed and Al-Hamadi, Hamid (2022) Trust-based management in IoT federations. Future Generation Computer Systems, 136 . pp. 182-192. ISSN 0167-739X

Upper bound

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, Maire and Swartzlander, Earl E. (2013) Power analysis attack of QCA circuits: a case study of the Serpent cipher. In: Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 19-23 May 2013, Beijing, China.

Utopia

Hudson, John (2011) All watched over by machines of loving grace: part 2, "The use and abuse of vegetational concepts". Digital Imaging and Photography .

Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

Utopian space

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

WWW

Hudson, John (2010) Culture and communication. Digital Imaging and Photography .

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

World Wide Web

Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .

bSOM

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2010) Binary object recognition system on FPGA with bSOM. In: The 23nd IEEE International SOC Conference, September 27 - 29, 2010, Las Vegas, Nevada.

binary SOM

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215

cellular automata

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

character recognition

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215

computer mediated communication

Hudson, John (2011) Utopias, the cathedral of the new Worlds and the microchip. Digital Imaging and Photography .

computer vision

Meng, Hongying, Freeman, Micheal, Pears, Nick and Bailey, Chris (2008) FPGA implementation of real-time human motion recognition on a reconfigurable video processing architecture. Journal of Real-time Image Processing, 3 (3). pp. 163-176. ISSN 1861-8200

cryptography

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

decryption process

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

defect tolerance

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

digital

Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .

digital designs

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

encryption process

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

fog-2-fog collaboration

Al-Khafajiy, Mohammed, Baker, Thar, Al-Libawy, Hilal, Maamar, Zakaria, Aloqaily, Moayad and Jararweh, Yaser (2019) Improving fog computing performance via Fog-2-Fog collaboration. Future Generation Computer Systems, 100 . pp. 266-280. ISSN 0167-739X

hybrid nano/CMOS

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

hybrid nano/CMOS computing architecture

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

identification technology

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

logic circuit

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

logic circuits

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

logic gates

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

logically reversible QCA circuit design

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

lookup-table

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

low power consumption

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

nanoelectronics

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

object recognition

Appiah, Kofi, Hunter, Andrew, Dickinson, Patrick and Meng, Hongying (2012) Implementation and applications of tri-state self-organizing maps on FPGA. IEEE Transactions on Circuits and Systems for Video Technology, 22 (8). pp. 1150-1160. ISSN 1051-8215

power analysis attack

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

quantum dots

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

quantum-dot cellular automata (QCA) power model

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

quantum-dot cellular automata technology

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

reliability

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

repair techniques

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

review

Hudson, John (2011) All watched over by machines of loving grace: part 3 "The monkey in the machine and the machine in the monkey". Digital Imaging and Photography .

side channel attacks

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

table lookup

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

tagged repair

Srivastava, S., Melouki, A. and Al-Hashimi, B. M. (2011) Tagged repair techniques for defect tolerance in hybrid nano/CMOS architecture. Nanotechnology, IEEE Transactions on, 10 (3). pp. 424-432. ISSN 1536-125X

upper bound power model

Liu, Weiqiang, Srivastava, Saket, Lu, Liang, O'Neill, M. and Swartzlander, E. E. (2012) Are QCA cryptographic circuits resistant to power analysis attack? Nanotechnology, IEEE Transactions on, 11 (6). pp. 1239-1251. ISSN 1536-125X

world wide web

Hudson, John (2010) The ‘architecture’ of the web: digital utopias and dystopias. Digital Imaging and Photography Blog .

www

Hudson, John (2010) Cyberculture to e-culture (sounds so late eighties early 90s)? Erm... towards e-topia? Part 2. Digital Imaging and Photography .

This list was generated on Tue Jul 5 22:58:36 2022 BST.