Search Results - "Computer systems organization Embedded and cyber-physical systems Embedded systems"

Refine Results
  1. 1

    CirCNN: accelerating and compressing deep neural networks using block-circulant weight matrices by Ding, Caiwen, Liao, Siyu, Wang, Yanzhi, Li, Zhe, Liu, Ning, Zhuo, Youwei, Wang, Chao, Qian, Xuehai, Bai, Yu, Yuan, Geng, Ma, Xiaolong, Zhang, Yipeng, Tang, Jian, Qiu, Qinru, Lin, Xue, Yuan, Bo

    ISBN: 1450349528, 9781450349529
    ISSN: 2379-3155
    Published: New York, NY, USA ACM 14.10.2017
    “…Large-scale deep neural networks (DNNs) are both compute and memory intensive. As the size of DNNs continues to grow, it is critical to improve the energy…”
    Get full text
    Conference Proceeding
  2. 2

    Reinforcement Learning-Assisted Management for Convertible SSDs by Wei, Qian, Li, Yi, Jia, Zhiping, Zhao, Mengying, Shen, Zhaoyan, Li, Bingzhe

    Published: IEEE 09.07.2023
    “…Convertible SSDs, which allow flash cells to convert between different types of flash cells (e.g., SLC/MLC/TLC/QLC), are designed for achieving both high…”
    Get full text
    Conference Proceeding
  3. 3

    Watermarking Deep Neural Networks for Embedded Systems by Guo, Jia, Potkonjak, Miodrag

    ISSN: 1558-2434
    Published: ACM 01.11.2018
    “…Deep neural networks (DNNs) have become an important tool for bringing intelligence to mobile and embedded devices. The increasingly wide deployment, sharing…”
    Get full text
    Conference Proceeding
  4. 4

    Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level by Schellenberg, Falk, Gnad, Dennis R.E., Moradi, Amir, Tahoori, Mehdi B.

    ISSN: 1558-2434
    Published: ACM 01.11.2018
    “…The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used…”
    Get full text
    Conference Proceeding
  5. 5

    Control Variate Approximation for DNN Accelerators by Zervakis, Georgios, Spantidi, Ourania, Anagnostopoulos, Iraklis, Amrouch, Hussam, Henkel, Jorg

    Published: IEEE 05.12.2021
    “…In this work, we introduce a control variate approximation technique for low error approximate Deep Neural Network (DNN) accelerators. The control variate…”
    Get full text
    Conference Proceeding
  6. 6

    DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands by Nam, Hwayong, Baek, Seungmin, Wi, Minbok, Kim, Michael Jaemin, Park, Jaehyun, Song, Chihun, Kim, Nam Sung, Ahn, Jung Ho

    Published: IEEE 29.06.2024
    “…The demand for precise information on DRAM microarchitectures and error characteristics has surged, driven by the need to explore processing in memory, enhance…”
    Get full text
    Conference Proceeding
  7. 7

    OmniBoost: Boosting Throughput of Heterogeneous Embedded Devices under Multi-DNN Workload by Karatzas, Andreas, Anagnostopoulos, Iraklis

    Published: IEEE 09.07.2023
    “…Modern Deep Neural Networks (DNNs) exhibit profound efficiency and accuracy properties. This has introduced application workloads that comprise of multiple DNN…”
    Get full text
    Conference Proceeding
  8. 8

    DyREM: Dynamically Mitigating Quantum Readout Error with Embedded Accelerator by Zhou, Kaiwen, Lu, Liqiang, Zhang, Hanyu, Xiang, Debin, Tao, Chenning, Zhao, Xinkui, Zheng, Size, Yin, Jianwei

    Published: IEEE 22.06.2025
    “…Quantum readout error is the most significant source of error, substantially reducing the measurement fidelity. Tensor-product-based readout error mitigation…”
    Get full text
    Conference Proceeding
  9. 9

    Analyzing and Improving Fault Tolerance of Learning-Based Navigation Systems by Wan, Zishen, Anwar, Aqeel, Hsiao, Yu-Shun, Jia, Tianyu, Reddi, Vijay Janapa, Raychowdhury, Arijit

    Published: IEEE 05.12.2021
    “…Learning-based navigation systems are widely used in autonomous applications, such as robotics, unmanned vehicles and drones. Specialized hardware accelerators…”
    Get full text
    Conference Proceeding
  10. 10

    TIE: Energy-efficient Tensor Train-based Inference Engine for Deep Neural Network by Deng, Chunhua, Sun, Fangxuan, Qian, Xuehai, Lin, Jun, Wang, Zhongfeng, Yuan, Bo

    ISSN: 2575-713X
    Published: ACM 01.06.2019
    “…In the era of artificial intelligence (AI), deep neural networks (DNNs) have emerged as the most important and powerful AI technique. However, large DNN models…”
    Get full text
    Conference Proceeding
  11. 11

    Guarder: A Stable and Lightweight Reconfigurable RRAM-based PIM Accelerator for DNN IP Protection by Lin, Ning, Li, Yi, Li, Jiankun, Yang, Jichang, He, Yangu, Luo, Yukui, Shang, Dashan, Chen, Xiaoming, Qi, Xiaojuan, Wang, Zhongrui

    Published: IEEE 22.06.2025
    “…Deploying deep neural networks (DNNs) on conventional digital edge devices faces significant challenges due to high energy consumption. A promising solution is…”
    Get full text
    Conference Proceeding
  12. 12

    LA-MTL: Latency-Aware Automated Multi-Task Learning by Sampath, Shambhavi Balamuthu, Sawani, Sami, Thoma, Moritz, Frickenstein, Lukas, Mori, Pierpaolo, Fasfous, Nael, Vemparala, Manoj Rohit, Frickenstein, Alexander, Schlichtmann, Ulf, Passerone, Claudio, Stechele, Walter

    Published: IEEE 22.06.2025
    “…Multi-Task Learning (MTL) aims to unify a variety of tasks into a single network for improved training and inference efficiency. This is particularly…”
    Get full text
    Conference Proceeding
  13. 13

    Exploiting Power Side-Channel Vulnerabilities in XGBoost Accelerator by Xiao, Yimeng, Gajjar, Archit, Aysu, Aydin, Franzon, Paul

    Published: IEEE 22.06.2025
    “…XGBoost (eXtreme Gradient Boosting), a widelyused decision tree algorithm, plays a crucial role in applications such as ransomware and fraud detection. While…”
    Get full text
    Conference Proceeding
  14. 14

    POLARIS: Explainable Artificial Intelligence for Mitigating Power Side-Channel Leakage by Mahfuz, Tanzim, Paria, Sudipta, Suha, Tasneem, Bhunia, Swarup, Chakraborty, Prabuddha

    Published: IEEE 22.06.2025
    “…Microelectronic systems are widely used in many sensitive applications (e.g., manufacturing, energy, defense). These systems increasingly handle sensitive data…”
    Get full text
    Conference Proceeding
  15. 15

    Late Breaking Results: Novel Design of MTJ-Based Unified LIF Spiking Neuron and PUF by Nasab, Milad Tanavardi, Yang, Wu, Thapliyal, Himanshu

    Published: IEEE 22.06.2025
    “…Due to the higher energy and hardware efficiency of spiking neural networks (SNNs) compared to deep neural networks, they have attracted a lot of attention…”
    Get full text
    Conference Proceeding
  16. 16

    SSDTrain: An Activation Offloading Framework to SSDs for Faster Large Language Model Training by Wu, Kun, Park, Jeongmin Brian, Zhang, Xiaofan, Hidayetoglu, Mert, Mailthody, Vikram Sharma, Huang, Sitao, Lumetta, Steve, Hwu, Wen-Mei

    Published: IEEE 22.06.2025
    “…The growth rate of the GPU memory capacity has not been able to keep up with that of the size of large language models (LLMs), hindering the model training…”
    Get full text
    Conference Proceeding
  17. 17

    GLiTCH: GLiTCH induced Transitions for Secure Crypto-Hardware by Menon, C. Rohin, Balasubramanian, Jayanth, Akshay Kumar, E, Valiveti, Annapurna, Rebeiro, Chester, Viraraghavan, Janakiraman

    Published: IEEE 22.06.2025
    “…Conventionally, glitch reduction is well-studied in digital design to improve power, efficiency, and security. In contrast, this paper combines the addition…”
    Get full text
    Conference Proceeding
  18. 18

    Security of Approximate Neural Networks against Power Side-channel Attacks by Japa, Aditya, Miskelly, Jack, O'Neill, Maire, Gu, Chongyan

    Published: IEEE 22.06.2025
    “…Emerging low-energy computing technologies, in particular approximate computing, are becoming increasingly relevant in key applications. A significant use case…”
    Get full text
    Conference Proceeding
  19. 19

    Hypnos: Memory Efficient Homomorphic Processing Unit by Wang, Haoxuan, Yang, Yinghao, Lu, Hang, Li, Xiaowei

    Published: IEEE 22.06.2025
    “…Fully Homomorphic Encryption (FHE) introduces a novel paradigm in privacy-preserving computation, extending its applicability to various scenarios. However,…”
    Get full text
    Conference Proceeding
  20. 20

    Learning-Aided Safe Controller Synthesis with Formal Guarantees via Vector Barrier Certificates by Zeng, Xia, Ren, Mengxin, Liu, Zhiming, Yang, Zhengfeng

    Published: IEEE 22.06.2025
    “…The design of controllers for safety-critical systems is an important research issue. Especially, the generation of controllers with formal safety guarantees…”
    Get full text
    Conference Proceeding