default search action
CF 2022: Turin, Italy
- Luca Sterpone, Andrea Bartolini, Anastasiia Butko:
CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022. ACM 2022, ISBN 978-1-4503-9338-6
Architecture
- Bingchao Li, Jizeng Wei:
REMOC: efficient request managements for on-chip memories of GPUs. 1-11 - Vishal Gupta, Biswabandan Panda:
Micro BTB: a high performance and storage efficient last-level branch target buffer for servers. 12-20 - Shounak Chakraborty, Vassos Soteriou, Magnus Själander:
STIFF: thermally safe temperature effect inversion aware FinFET based multi-core. 21-29 - Yang Yang, Sanmukh R. Kuppannagari, Rajgopal Kannan, Viktor K. Prasanna:
NTTGen: a framework for generating low latency NTT implementations on FPGA. 30-39 - Yuan Meng, Chi Zhang, Viktor K. Prasanna:
FPGA acceleration of deep reinforcement learning using on-chip replay management. 40-48 - Md Alvee Noor, Kenneth B. Kent, Kazuhiro Konno, Daryl Maier:
SIMD support to improve eclipse OpenJ9 performance on the AArch64 platform. 49-57
Security
- Liang Zhang, Haibin Kan, Honglan Huang:
Patient-centered cross-enterprise document sharing and dynamic consent framework using consortium blockchain and ciphertext-policy attribute-based encryption. 58-66 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Haoran Zhu:
Evaluating fork after withholding (FAW) attack in Bitcoin. 67-74 - Gildo Torres, Chen Liu:
Where's Waldo?: identifying anomalous behavior of data-only attacks using hardware features. 75-84
Codesign
- Longpan Luo, Yujuan Tan, Duo Liu, Moming Duan, Weilue Wang, Yu Wu, Xianzhang Chen:
Lazy repair with temporary redundancy(LRTR): reducing repair network traffic in erasure-coded storage. 85-93 - Zewei Mo, Zejia Lin, Xianwei Zhang, Yutong Lu:
moTuner: a compiler-based auto-tuning approach for mixed-precision operators. 94-102 - Pengmiao Zhang, Ajitesh Srivastava, Anant V. Nori, Rajgopal Kannan, Viktor K. Prasanna:
Fine-grained address segmentation for attention-based variable-degree prefetching. 103-112
Quantum computing
- Lingling Lao, Ben Criger:
Magic state injection on the rotated surface code. 113-120 - Sohrab Sajadimanesh, Jean Paul Latyr Faye, Ehsan Atoofian:
Practical approximate quantum multipliers for NISQ devices. 121-130
Deep learning
- Dante Niewenhuis, Ana Lucia Varbanescu:
Efficient trimming for strongly connected components calculation. 131-140 - Alina Machidon, Veljko Pejovic:
Enabling resource-efficient edge intelligence with compressive sensing-based deep learning. 141-149 - Na Lin, Hongzhi Qin, Junling Shi, Liang Zhao:
Deep reinforcement learning empowered multiple UAVs-assisted caching and offloading optimization in D2D wireless networks. 150-158 - Milan Jain, Sayan Ghosh, Sai Pushpak Nandanoori:
Workload characterization of a time-series prediction system for spatio-temporal data. 159-168
Architecture
- Murat Isik, Ankita Paul, M. Lakshmi Varshika, Anup Das:
A design methodology for fault-tolerant computing using astrocyte neural networks. 169-172
Security
- José E. Moreira, Debapriya Chatterjee, Kattamuri Ekanadham, Arnold Flores:
Return-oriented programming protection in the IBM POWER10. 173-176
Codesign
- Kaijie Fan, Biagio Cosenza, Ben H. H. Juurlink:
FLEXDP: flexible frequency scaling for energy-delay product optimization of GPU applications. 177-180 - Haizhou Du, Sheng Huang, Qiao Xiang:
Orchestra: adaptively accelerating distributed deep learning in heterogeneous environments. 181-184 - Kunyu Zhou, Keni Qiu:
REC: REtime convolutional layers in energy harvesting ReRAM-based CNN accelerators. 185-188
Quantum Computing
- Supreeth Mysore Venkatesh, Antonio Macaluso, Matthias Klusch:
BILP-Q: quantum coalition structure generation. 189-192
Poster Papers
- Andrea Galimberti, Davide Galli, Gabriele Montanaro, William Fornaciari, Davide Zoni:
On the use of hardware accelerators in QC-MDPC code-based cryptography. 193-194 - Amir Raoofy, Josef Weidendorfer, Michael Ott:
Always-on instrumentation for application introspection in HPC. 195-196 - Mohsen Seyedkazemi Ardebili, Andrea Bartolini, Luca Benini:
Multi-level anomaly prediction in Tier-0 datacenter: a deep learning approach. 197-198 - Luca Zanatta, Francesco Barchi, Andrea Bartolini, Andrea Acquaviva:
Artificial versus spiking neural networks for reinforcement learning in UAV obstacle avoidance. 199-200 - Nicolas Bohm Agostini, Serena Curzel, David R. Kaeli, Antonino Tumeo:
SODA-OPT an MLIR based flow for co-design and high-level synthesis. 201-202 - Martin Molan, Andrea Borghesi, Luca Benini, Andrea Bartolini:
Semi-supervised anomaly detection on a Tier-0 HPC system. 203-204 - Tom Slooff, Francesco Regazzoni, Fabien Brocheton, Antonio Parodi, Radim Cmar:
Anomaly detection to improve security of big data analytics. 205-206 - Federico Ficarelli, Andrea Bartolini, Emanuele Parisi, Francesco Beneventi, Francesco Barchi, Daniele Gregori, Fabrizio Magugliani, Marco Cicala, Cosimo Gianfreda, Daniele Cesarini, Andrea Acquaviva, Luca Benini:
Meet Monte Cimone: exploring RISC-V high performance compute clusters. 207-208 - Serena Curzel, Nicolas Bohm Agostini, Antonino Tumeo, Fabrizio Ferrandi:
Hardware acceleration of complex machine learning models through modern high-level synthesis. 209-210 - Davide Gadioli, Emanuele Vitali, Federico Ficarelli, Chiara Latini, Candida Manelfi, Carmine Talarico, Cristina Silvano, Andrea Rosario Beccari, Gianluca Palermo:
An extreme-scale virtual screening platform for drug discovery. 211-212 - Thorir Mar Ingolfsson, Mark Vero, Xiaying Wang, Lorenzo Lamberti, Luca Benini, Matteo Spallanzani:
Reducing neural architecture search spaces with training-free statistics and computational graph clustering. 213-214
Invited talk papers from special sessions: Special session on computer architectures in space
- Eleonora Vacca, Corrado De Sio, Sarah Azimi:
Layout-oriented radiation effects mitigation in RISC-V soft processor. 215-220 - Max Ghiglione, Vittorio Serra:
Opportunities and challenges of AI on satellite processing units. 221-224 - Amir Raoofy, Gabriel Dax, Vittorio Serra, Max Ghiglione, Martin Werner, Carsten Trinitis:
Benchmarking and feasibility aspects of machine learning in space systems. 225-226 - Hanna Vivien Schwarzwald, Sebastian Würl, Martin Langer, Carsten Trinitis:
MicroPython as a satellite control language. 227-229
Papers from co-located workshops: 1st Annual Compiler Frontiers Workshop 2022
- Robin F. Voetter, Marcel Huijben, Kristian F. D. Rietveld:
Compilation on the GPU?: a feasibility study. 230-236 - Davide Ferrari, Michele Amoretti:
Noise-adaptive quantum compilation strategies evaluated with application-motivated benchmarks. 237-243 - Gaurav Verma, Swetang Finviya, Abid M. Malik, Murali Emani, Barbara M. Chapman:
Towards neural architecture-aware exploration of compiler optimizations in a deep learning {graph} compiler. 244-250
Papers from co-located workshops: Big Data Analytics Workshop - BigDAW 2022
- Nanmiao Wu, Vito Giovanni Castellana, Hartmut Kaiser:
Towards superior software portability with SHAD and HPX C++ libraries. 251-257
Papers from co-located workshops: Malicious Software and Hardware in Internet of Things 2022
- Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens:
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology. 258-262 - Shengyu Duan, Gaole Sai:
A secure authentication scheme based on differential public PUF. 263-269 - Alexandre Rodrigues, João Carlos Resende, Ricardo Chaves:
SmartFusion2 SoC as a security module for the IoT world. 270-278 - Christelle Nader, Elias Bou-Harb:
An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a NAT. 279-286 - Gheorghe Pojoga, Kostas Papagiannopoulos:
Low-latency implementation of the GIFT cipher on RISC-V architectures. 287-295 - Ryo Iijima, Tatsuya Takehisa, Tatsuya Mori:
Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals. 296-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.