Current Hardware Trojan (HT) detection techniques are mostly developed b...
Hardware Trojans (HTs) are undesired design or manufacturing modificatio...
Estimating the state preparation fidelity of highly entangled states on ...
This paper utilizes Reinforcement Learning (RL) as a means to automate t...
We present a divide-and-conquer approach to deterministically prepare Di...
Performance modeling of parallel applications on multicore computers rem...
As diminishing feature sizes drive down the energy for computations, the...