


default search action
CF 2022: Turin, Italy
- Luca Sterpone, Andrea Bartolini, Anastasiia Butko:

CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022. ACM 2022, ISBN 978-1-4503-9338-6
Architecture
- Bingchao Li, Jizeng Wei:

REMOC: efficient request managements for on-chip memories of GPUs. 1-11 - Vishal Gupta, Biswabandan Panda

:
Micro BTB: a high performance and storage efficient last-level branch target buffer for servers. 12-20 - Shounak Chakraborty, Vassos Soteriou, Magnus Själander

:
STIFF: thermally safe temperature effect inversion aware FinFET based multi-core. 21-29 - Yang Yang, Sanmukh R. Kuppannagari

, Rajgopal Kannan, Viktor K. Prasanna:
NTTGen: a framework for generating low latency NTT implementations on FPGA. 30-39 - Yuan Meng

, Chi Zhang, Viktor K. Prasanna:
FPGA acceleration of deep reinforcement learning using on-chip replay management. 40-48 - Md Alvee Noor, Kenneth B. Kent

, Kazuhiro Konno, Daryl Maier:
SIMD support to improve eclipse OpenJ9 performance on the AArch64 platform. 49-57
Security
- Liang Zhang

, Haibin Kan, Honglan Huang:
Patient-centered cross-enterprise document sharing and dynamic consent framework using consortium blockchain and ciphertext-policy attribute-based encryption. 58-66 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Haoran Zhu

:
Evaluating fork after withholding (FAW) attack in Bitcoin. 67-74 - Gildo Torres, Chen Liu

:
Where's Waldo?: identifying anomalous behavior of data-only attacks using hardware features. 75-84
Codesign
- Longpan Luo, Yujuan Tan, Duo Liu, Moming Duan, Weilue Wang, Yu Wu, Xianzhang Chen

:
Lazy repair with temporary redundancy(LRTR): reducing repair network traffic in erasure-coded storage. 85-93 - Zewei Mo, Zejia Lin

, Xianwei Zhang, Yutong Lu:
moTuner: a compiler-based auto-tuning approach for mixed-precision operators. 94-102 - Pengmiao Zhang, Ajitesh Srivastava, Anant V. Nori, Rajgopal Kannan, Viktor K. Prasanna:

Fine-grained address segmentation for attention-based variable-degree prefetching. 103-112
Quantum computing
- Lingling Lao, Ben Criger:

Magic state injection on the rotated surface code. 113-120 - Sohrab Sajadimanesh, Jean Paul Latyr Faye, Ehsan Atoofian:

Practical approximate quantum multipliers for NISQ devices. 121-130
Deep learning
- Dante Niewenhuis

, Ana Lucia Varbanescu:
Efficient trimming for strongly connected components calculation. 131-140 - Alina Machidon, Veljko Pejovic

:
Enabling resource-efficient edge intelligence with compressive sensing-based deep learning. 141-149 - Na Lin, Hongzhi Qin, Junling Shi, Liang Zhao

:
Deep reinforcement learning empowered multiple UAVs-assisted caching and offloading optimization in D2D wireless networks. 150-158 - Milan Jain

, Sayan Ghosh, Sai Pushpak Nandanoori:
Workload characterization of a time-series prediction system for spatio-temporal data. 159-168
Architecture
- Murat Isik, Ankita Paul, M. Lakshmi Varshika, Anup Das

:
A design methodology for fault-tolerant computing using astrocyte neural networks. 169-172
Security
- José E. Moreira, Debapriya Chatterjee, Kattamuri Ekanadham, Arnold Flores:

Return-oriented programming protection in the IBM POWER10. 173-176
Codesign
- Kaijie Fan, Biagio Cosenza

, Ben H. H. Juurlink:
FLEXDP: flexible frequency scaling for energy-delay product optimization of GPU applications. 177-180 - Haizhou Du, Sheng Huang, Qiao Xiang:

Orchestra: adaptively accelerating distributed deep learning in heterogeneous environments. 181-184 - Kunyu Zhou

, Keni Qiu:
REC: REtime convolutional layers in energy harvesting ReRAM-based CNN accelerators. 185-188
Quantum Computing
- Supreeth Mysore Venkatesh

, Antonio Macaluso
, Matthias Klusch:
BILP-Q: quantum coalition structure generation. 189-192
Poster Papers
- Andrea Galimberti

, Davide Galli
, Gabriele Montanaro, William Fornaciari
, Davide Zoni:
On the use of hardware accelerators in QC-MDPC code-based cryptography. 193-194 - Amir Raoofy, Josef Weidendorfer, Michael Ott:

Always-on instrumentation for application introspection in HPC. 195-196 - Mohsen Seyedkazemi Ardebili

, Andrea Bartolini, Luca Benini:
Multi-level anomaly prediction in Tier-0 datacenter: a deep learning approach. 197-198 - Luca Zanatta

, Francesco Barchi, Andrea Bartolini, Andrea Acquaviva:
Artificial versus spiking neural networks for reinforcement learning in UAV obstacle avoidance. 199-200 - Nicolas Bohm Agostini

, Serena Curzel
, David R. Kaeli, Antonino Tumeo:
SODA-OPT an MLIR based flow for co-design and high-level synthesis. 201-202 - Martin Molan

, Andrea Borghesi, Luca Benini, Andrea Bartolini:
Semi-supervised anomaly detection on a Tier-0 HPC system. 203-204 - Tom Slooff, Francesco Regazzoni

, Fabien Brocheton, Antonio Parodi, Radim Cmar:
Anomaly detection to improve security of big data analytics. 205-206 - Federico Ficarelli, Andrea Bartolini, Emanuele Parisi

, Francesco Beneventi, Francesco Barchi, Daniele Gregori, Fabrizio Magugliani, Marco Cicala, Cosimo Gianfreda, Daniele Cesarini, Andrea Acquaviva, Luca Benini:
Meet Monte Cimone: exploring RISC-V high performance compute clusters. 207-208 - Serena Curzel

, Nicolas Bohm Agostini
, Antonino Tumeo, Fabrizio Ferrandi
:
Hardware acceleration of complex machine learning models through modern high-level synthesis. 209-210 - Davide Gadioli, Emanuele Vitali, Federico Ficarelli, Chiara Latini, Candida Manelfi, Carmine Talarico

, Cristina Silvano, Andrea Rosario Beccari, Gianluca Palermo:
An extreme-scale virtual screening platform for drug discovery. 211-212 - Thorir Mar Ingolfsson, Mark Vero, Xiaying Wang

, Lorenzo Lamberti
, Luca Benini, Matteo Spallanzani:
Reducing neural architecture search spaces with training-free statistics and computational graph clustering. 213-214
Invited talk papers from special sessions: Special session on computer architectures in space
- Eleonora Vacca, Corrado De Sio, Sarah Azimi

:
Layout-oriented radiation effects mitigation in RISC-V soft processor. 215-220 - Max Ghiglione, Vittorio Serra:

Opportunities and challenges of AI on satellite processing units. 221-224 - Amir Raoofy, Gabriel Dax, Vittorio Serra, Max Ghiglione, Martin Werner

, Carsten Trinitis:
Benchmarking and feasibility aspects of machine learning in space systems. 225-226 - Hanna Vivien Schwarzwald, Sebastian Würl, Martin Langer, Carsten Trinitis:

MicroPython as a satellite control language. 227-229
Papers from co-located workshops: 1st Annual Compiler Frontiers Workshop 2022
- Robin F. Voetter, Marcel Huijben, Kristian F. D. Rietveld

:
Compilation on the GPU?: a feasibility study. 230-236 - Davide Ferrari

, Michele Amoretti:
Noise-adaptive quantum compilation strategies evaluated with application-motivated benchmarks. 237-243 - Gaurav Verma

, Swetang Finviya, Abid M. Malik, Murali Emani, Barbara M. Chapman:
Towards neural architecture-aware exploration of compiler optimizations in a deep learning {graph} compiler. 244-250
Papers from co-located workshops: Big Data Analytics Workshop - BigDAW 2022
- Nanmiao Wu, Vito Giovanni Castellana, Hartmut Kaiser

:
Towards superior software portability with SHAD and HPX C++ libraries. 251-257
Papers from co-located workshops: Malicious Software and Hardware in Internet of Things 2022
- Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens

:
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology. 258-262 - Shengyu Duan

, Gaole Sai:
A secure authentication scheme based on differential public PUF. 263-269 - Alexandre Rodrigues, João Carlos Resende, Ricardo Chaves

:
SmartFusion2 SoC as a security module for the IoT world. 270-278 - Christelle Nader, Elias Bou-Harb:

An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a NAT. 279-286 - Gheorghe Pojoga, Kostas Papagiannopoulos:

Low-latency implementation of the GIFT cipher on RISC-V architectures. 287-295 - Ryo Iijima, Tatsuya Takehisa, Tatsuya Mori:

Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signals. 296-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














