Competitive advantage may depend less on secrecy and more on speed. Welcome to Duke Fuqua insights, a Podcast where we ...
Abstract: People have a hard time using cloud computing because of rules concerning privacy and security in fields like healthcare and banking. Fully Homomorphic Encryption (FHE) lets computers work ...
Landlords could no longer rely on rent-pricing software to quietly track each other's moves and push rents higher using confidential data, under a settlement between RealPage Inc. and federal ...
Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
ABSTRACT: The study adapts several machine-learning and deep-learning architectures to recognize 63 traditional instruments in weakly labelled, polyphonic audio synthesized from the proprietary Sound ...
Abstract: Detection of soft errors and faults are one of the most critical factors in ensuring the reliability of algorithm implementations. Multiplication, as a fundamental and computationally ...
Discovering faster algorithms for matrix multiplication remains a key pursuit in computer science and numerical linear algebra. Since the pioneering contributions of Strassen and Winograd in the late ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results