default search action
CF 2019: Alghero, Italy
- Francesca Palumbo, Michela Becchi, Martin Schulz, Kento Sato:
Proceedings of the 16th ACM International Conference on Computing Frontiers, CF 2019, Alghero, Italy, April 30 - May 2, 2019. ACM 2019, ISBN 978-1-4503-6685-4
Keynotes
- Catherine Graves:
High performance, power efficient hardware accelerators: emerging devices, circuits and architecture co-design. 1 - Danilo Pau:
Artificial intelligent sensors at the core of cyber-physical-systems: from theory to practical applications. 2
Machine Learning
- Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski:
nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. 3-13 - Xuewen Cui, Wu-chun Feng:
Iterative machine learning (IterML) for effective parameter pruning and tuning in accelerators. 16-23
Security
- Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. 24-31 - Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. 32-41 - Muhammad Ali Siddiqi, Christos Strydis:
Towards realistic battery-DoS protection of implantable medical devices. 42-49 - Francis B. Moreira, Daniel A. G. de Oliveira, Philippe O. A. Navaux:
SPADA: a statistical program attack detection analysis. 50-58
Architectures
- Florian Neugebauer, Ilia Polian, John P. Hayes:
On the maximum function in stochastic computing. 59-66 - Swamit S. Tannu, Poulami Das, Michael L. Lewis, Robert F. Krick, Douglas M. Carmean, Moinuddin K. Qureshi:
A case for superconducting accelerators. 67-75
Quantum computing
- Elijah Pelofske, Georg Hahn, Hristo N. Djidjev:
Solving large minimum vertex cover problems on a quantum annealer. 76-84 - Jun Doi, Hitomi Takahashi, Rudy Raymond, Takashi Imamichi, Hiroshi Horii:
Quantum computing simulator on a heterogenous HPC system. 85-93
Optimization and algorithms
- Marcelino Rodriguez-Cancio, Benoît Combemale, Benoit Baudry:
Approximate loop unrolling. 94-105 - Anastasiia Butko, George Michelogiannakis, David Donofrio, John Shalf:
TIGER: topology-aware task assignment approach using ising machines. 106-114 - Shuo Ji, Yinliang Zhao, Qing Yi:
Accelerating parallel graph computing with speculation. 115-124 - Kartik Lakhotia, Rajgopal Kannan, Aditya Gaur, Ajitesh Srivastava, Viktor K. Prasanna:
Parallel edge-based sampling for static and dynamic graphs. 125-134
Memory technologies
- Foteini Strati, Christina Giannoula, Dimitrios Siakavaras, Georgios I. Goumas, Nectarios Koziris:
An adaptive concurrent priority queue for NUMA architectures. 135-144 - Alexandre Chabot, Ihsen Alouani, Smaïl Niar, Réda Nouacer:
A new memory reliability technique for multiple bit upsets mitigation. 145-152 - Christos Sakalis, Mehdi Alipour, Alberto Ros, Alexandra Jimborean, Stefanos Kaxiras, Magnus Själander:
Ghost loads: what is the cost of invisible speculation? 153-163
Programming systems and abstractions
- Matthew Sotoudeh, Anand Venkat, Michael J. Anderson, Evangelos Georganas, Alexander Heinecke, Jason Knight:
ISA mapper: a compute and hardware agnostic deep learning compiler. 164-173 - Long Chen, Wei Ye, Shikun Zhang:
Capturing source code semantics via tree-based convolution over API-enhanced AST. 174-182
Machine Learning
- Yehya Nasser, Carlo Sau, Jean-Christophe Prévotet, Tiziana Fanni, Francesca Palumbo, Maryline Hélard, Luigi Raffo:
NeuPow: artificial neural networks for power and behavioral modeling of arithmetic components in 45nm ASICs technology. 183-189 - Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. 190-196 - Zhou Cheng, Tianmei Qi, Jixiang Wang, Yu Zhou, Zhihong Wang, Yi Guo, Junfeng Zhao:
Sentiment evaluation of forex news. 197-201 - Liang Ge, Aoli Zhou, Hang Li, Junling Liu:
Spatially fine-grained air quality prediction based on DBU-LSTM. 202-205
Security
- Swastika Dutta, Sayan Sinha:
Performance statistics and learning based detection of exploitative speculative attacks. 206-210 - Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. 211-214
Architectures
- Marcel Brand, Michael Witterauf, Frank Hannig, Jürgen Teich:
Anytime instructions for programmable accuracy floating-point arithmetic. 215-219
Quantum Computing
- Georgiy Krylov, Martin Lukac:
Quantum encoded quantum evolutionary algorithm for the design of quantum circuits. 220-225 - Daniel Vert, Renaud Sirdey, Stéphane Louise:
On the limitations of the chimera graph topology in using analog quantum computers. 226-229 - Suvadip Batabyal, Kounteya Sarkar:
Realizing parallelism in quantum MISD architecture. 230-234
Mobile and edge computing
- Alessio Burrello, Alex Marchioni, Davide Brunelli, Luca Benini:
Embedding principal component analysis for data reduction in structural health monitoring on low-cost IoT gateways. 235-239 - Erick Lavoie, Laurie J. Hendren:
Personal volunteer computing. 240-246 - Syuan-Yi Lin, Chung-Ta King:
User-centered context-aware CPU/GPU power management for interactive applications on smartphones. 247-250
Memory technologies
- Wang Xu, Israel Koren:
Designing a secure DRAM+NVM hybrid memory module. 251-255 - Ivy Bo Peng, Jeffrey S. Vetter, Shirley Moore, Joydeep Rakshit, Stefano Markidis:
Analyzing the suitability of contemporary 3D-stacked PIM architectures for HPC scientific applications. 256-262
Programming systems and abstractions
- Martin Surkovský:
MP net as abstract model of communication for message-passing applications. 263-267 - Ruidong Gu, Michela Becchi:
A comparative study of parallel programming frameworks for distributed GPU applications. 268-273 - Cristobal Camarero, Carmen Martínez, José Luis Bosque:
Simulation with skeletons of applications using dimemas. 274-278 - Anne Hommelberg, Kristian F. D. Rietveld, Harry A. G. Wijshoff:
Abstracting parallel program specification: a case study on k-means clustering. 279-282
Poster papers
- Muhammad Ali Siddiqi, Christos Strydis:
IMD security vs. energy: are we tilting at windmills?: POSTER. 283-285 - Zhou Cheng, Jixiang Wang, Tianmei Qi, Junfeng Zhao, Zhihong Wang, Yi Guo, Yu Zhou:
Will sentiment of forex news effect forecast of the RMB exchange rate?: POSTER. 286-288 - Daniel Madroñal, Tiziana Fanni:
Run-time performance monitoring of hardware accelerators: POSTER. 289-291 - Daniele Cattaneo, Antonio Di Bello, Michele Chiari, Stefano Cherubin, Giovanni Agosta:
Fixed point exploitation via compiler analyses and transformations: POSTER. 292-294 - Qingchang Han, Hailong Yang, Zhongzhi Luan, Depei Qian:
Accelerating tile low-rank GEMM on sunway architecture: POSTER. 295-297 - Emanuele Vitali, Davide Gadioli, Andrea Beccari, Carlo Cavazzoni, Cristina Silvano, Gianluca Palermo:
An hybrid approach to accelerate a molecular docking application for virtual screening in heterogeneous nodes: POSTER. 298-299 - G. A. Gillani, André B. J. Kokkeler:
Go green radio astronomy: Approximate Computing Perspective: Opportunities and Challenges: POSTER. 300-301 - Carsten Trinitis, Christina B. Class, Stefan Ullrich:
The german informatics society's new ethical guidelines: POSTER. 302-304 - Krista Rizman Zalik, Borut Zalik:
Using community detection for spatial networks: POSTER. 305-306
Special session on the data model convergence: Architecture
- John L. Gustafson:
Next-generation arithmetic: major performance gains with minimal disruption. 307 - John D. Leidel, Frank Conlon:
Toward a graph-based dependence analysis framework for high level design verification. 308-316 - Anastasiia Butko, George Michelogiannakis, David Donofrio, John Shalf:
Extending classical processors to support future large scale quantum accelerators. 317 - Alejandro Rico:
Scaling up performance of fat nodes for HPC. 318
Special invited session on EU projects
- Mario Kovac:
European processor initiative: the industrial cornerstone of EuroHPC for exascale era. 319 - Francesca Palumbo, Tiziana Fanni, Carlo Sau, Luca Pulina, Luigi Raffo, Michael Masin, Evgeny Shindin, Pablo Sanchez de Rojas, Karol Desnos, Maxime Pelcat, Alfonso Rodríguez, Eduardo Juárez, Francesco Regazzoni, Giuseppe Meloni, Katiuscia Zedda, Hans Myrhaug, Leszek Kaliciak, Joost Adriaanse, Julio de Oliveira Filho, Pablo Muñoz, Antonella Toffetti:
CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments: Invited paper: CERBERO teams from UniSS, UniCA, IBM Research, TASE, INSA-Rennes, UPM, USI, Abinsula, AmbieSense, TNO, S&T, CRF. 320-325 - Paolo Meloni, Daniela Loi, Paola Busia, Gianfranco Deriu, Andy D. Pimentel, Dolly Sapra, Todor P. Stefanov, Svetlana Minakova, Francesco Conti, Luca Benini, Maura Pintor, Battista Biggio, Bernhard Moser, Natalia Shepeleva, Nikos Fragoulis, Ilias Theodorakopoulos, Michael Masin, Francesca Palumbo:
Optimization and deployment of CNNs at the edge: the ALOHA experience. 326-332 - Zaid Al-Ars, Twan Basten, Ad de Beer, Marc Geilen, Dip Goswami, Pekka Jääskeläinen, Jirí Kadlec, Marcos Martinez de Alejandro, Francesca Palumbo, Geran Peeren, Luigi Pomante, Frank van der Linden, Jukka Saarinen, Tero Säntti, Carlo Sau, Maria Katiuscia Zedda:
The FitOptiVis ECSEL project: highly efficient distributed embedded image/video processing in cyber-physical systems. 333-338 - Petar Radojkovic:
Towards resilient EU HPC systems: a blueprint. 339
Special session on the data model convergence: Co-design
- Alex Pothen:
Parallel algorithms through approximation: graphs, data privacy and machine learning. 340 - Johannes Langguth:
PGAS for graph analytics: can one sided communications break the scalability barrier? 341 - Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Analysing the tor web with high performance graph algorithms. 342 - Antonino Tumeo:
Data and model convergence: a case for software defined architectures. 343
5th workshop on design of low power embedded systems (LP-EMS19)
- Geneviève Ndour, Tiago Trevisan Jost, Anca Molnos, Yves Durand, Arnaud Tisserand:
Evaluation of variable bit-width units in a RISC-V processor for approximate computing. 344-349 - Matteo Antonio Scrugli, Daniela Loi, Luigi Raffo, Paolo Meloni:
A runtime-adaptive cognitive IoT node for healthcare monitoring. 350-357 - G. A. Gillani, A. Krapukhin, André B. J. Kokkeler:
Energy-efficient approximate least squares accelerator: a case study of radio astronomy calibration processing. 358-365 - Crefeda Faviola Rodrigues, Graham D. Riley, Mikel Luján:
Exploration of task-based scheduling for convolutional neural networks accelerators under memory constraints. 366-372
Malicious software and hardware in internet of things (MAL-IOT19)
- Yan Yan, Elisabeth Oswald:
Examining the practical side channel resilience of ARX-boxes. 373-379 - Samuel N. Eshun, Paolo Palmieri:
A privacy-preserving protocol for indoor wi-fi localization. 380-385 - Niccolò Izzo, Alessandro Barenghi, Luca Breveglieri, Gerardo Pelosi, Paolo Amato:
A secure and authenticated host-to-memory communication interface. 386-391 - Sebastian Wallat, Nils Albartus, Steffen Becker, Max Hoffmann, Maik Ender, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. 392-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.