Journal: IEEE Micro

Volume 46, Issue 2

4 -- 6Hsien-Hsin S. Lee. Reframing AI Memory
7 -- 10Brian Hirano, Saugata Ghose. Special Issue on Data-Centric Computing
11 -- 20Peter M. Kogge. A Retrospective Walk Down the "Processing in Memory" Lane
21 -- 28Derrick Quinn, E. Ezgi Yücel, José F. Martínez, Mohammad Alian. Multistage Data-Centric Dense Retrieval
29 -- 37Ben Feinberg, T. Patrick Xiao, Christopher H. Bennett, Sapan Agarwal. Let Analog Be Analog: Principles for Designing Analog Accelerators
38 -- 50Abhimanyu Rajeshkumar Bambhaniya, Sheng-Chun Kao, Geonhwa Jeong, Suvinay Subramanian, Amir Yazdanbakhsh, Tushar Krishna. Demystifying the Cost Versus Benefits of Sparse Large Language Model Acceleration
51 -- 58Wonseok Choi 0015, Sangpyo Kim, Jaiyoung Park, Jung Ho Ahn. A Five-Year Journey to Accelerate Homomorphic Encryption With GPUs, Demonstrated by Sub-25-ms Convolutional Neural Network Inference
59 -- 69Sajjad Tamimi, Arthur Bernhardt, Ilia Petrov 0001, Andreas Koch 0001. Accelerating Modern Database Systems by Leveraging Computational Storage and Cache-Coherent Interconnects
70 -- 80William Andrew Simon, Leonid Yavits, Konstantina Koliogeorgi, Yann Falevoz, Yoshihiro Shibuya, Dominique Lavenier, Irem Boybat, Klea Zambaku, Berkan Sahin, Mohammad Sadrosadati, Onur Mutlu, Abu Sebastian, Rayan Chikhi, The BioPIM Consortium, Can Alkan. Processing-in-Memory for Genomics Workloads
81 -- 89Galen M. Shipman, Jered Benjamin Dominguez-Trujillo, Gary A. Grider, Kamalavasan Kamalakkannan, Kevin Sheridan, Qing Zheng. Codesign of Data-Centric Computing for Nuclear Security Science
90 -- 92Ryusuke Egawa, Yasutaka Wada. Special Issue on COOL Chips
93 -- 101Jangwoo Kim, Junpyo Kim, Junhyuk Choi, Jungmin Cho, Juwon Hong, Hyeonseong Jeong, Dongmoon Min, Ilkwon Byun, Masamitsu Tanaka, Koji Inoue. Architecting a Full-Stack Superconducting Fault-Tolerant Quantum Computer
102 -- 112Vu Trung Duong Le, Hoai Luan Pham, Tuan Hai Vu 0001, Van Duy Tran, Yasuhiko Nakashima. UniCrypt-Ultra: A 64-Bit Quad-Core Universal Cryptographic Engine for Multimode Cryptographic Processing in Blockchain IoT and Society 5.0
113 -- 121Mebuki Oishi, Sun Tanaka, Shinya Takamaeda-Yamazaki. RustSFQ: A Rust-Based Domain-Specific Language for Efficient Single-Flux-Quantum Circuit Design
122 -- 131Ayumi Ohno, Kotaro Shimamura, Shinya Takamaeda-Yamazaki. High-Performance Elliptic Curve Point Addition on Versal AI Engine for Multi-Scalar Multiplication
132 -- 140Hsueh Chen, Hsiu-Wei Chen, Shih-Hsu Huang, Po-Yuan Chen. High-Performance Hardware Architecture for Polynomial Multiplication in CRYSTALS-Kyber
141 -- 150Seunghyun Park 0002, Daejin Park. Exploiting Output Activation Sparsity Using Bit-Separable Multiplier in Convoluted Neural Network Accelerator
152 -- 158Ningning Pan, Lei Ma, Xinting Ge, Hang Xiao, Xiaodan Sui, Yanyun Jiang, Yuanjie Zheng, Wei Rang. ReDL: A Hybrid Memory System With Scalable Data Management Strategies for Deep Neural Network Applications
159 -- 164Joshua J. Yi. Review of Wisconsin Alumni Research Foundation v. Apple - Part IX
166 -- 168Shane Greenstein. Underestimating Amazon Web Services

Volume 46, Issue 1

4 -- 5Hsien-Hsin S. Lee. Silicon Pact: Reshoring the Supply Chain as Geopolitical Insurance
6 -- 9Dimitris Gizopoulos. Special Issue on Silent Data Corruptions - From Silicon to Cloud Data Centers and AI Systems of Huge Scale
10 -- 18Nirmal Saxena, Saurabh Hukerikar, Siva Hari. Silent Data Corruption: Optimal Mitigation Strategies for Data Center Computing
19 -- 28Nikos Karystinos, George-Marios Fragkoulis, Odysseas Chatzopoulos, Dimitris Gizopoulos, Sudhanva Gurumurthi. Harpocrates++: Automated Functional Program Generation Against CPU Faults and Silent Data Corruptions
29 -- 33Pradip Bose, Ramon Bertran, Alper Buyuktosunoglu, Hans M. Jacobson, Karthik Swaminathan, Matthias Pflanz, Charles F. Webb, Tobias Webel, Christian Jacobi 0002. Robust Power Management: A Key Aspect of Silent Data Corruption-Free Systems
34 -- 43Manu Shamsa, David P. Lerner, Arani Sinha, Thiago Macieira, Yogesh Varma. Methodical Detection of Silent Data Errors From Foundry to Fleet
44 -- 51Hengzhi Pei, Leonard Lausen, George Karypis. Connecting the Impact of Silent Data Corruption With Different Training Characteristics: An Empirical Study
52 -- 54Carlos Vallin, Rama Bhimanadhuni, Robert S. Chappell. Silent Data Corruption Challenges in Modern AI Public Cloud Deployments
55 -- 65Odysseas Chatzopoulos, Maria Trakosa, Harish Dattatraya Dixit, Sriram Sankar, Dimitris Gizopoulos. Phoebe: Measuring the Unmeasurable - Demystifying Silent Data Corruptions in AI Accelerators Through Microarchitectural Modeling
66 -- 72Nishant George, Sudhanva Gurumurthi, Vilas Sridharan, Harish Dattatraya Dixit, Emel Goksu, Bharath Parthasarathy, Amber Huffman, Thiago Macieira, Arani Sinha, Dean Liberty, Lisa Minwell, Robert S. Chappell. Silent Data Corruption in Artificial Intelligence: A Growing Challenge for Large-Scale Machine Learning
73 -- 85Xuan-Jun Chen, Chia-Lin Yang. CIMNet: Joint Search for Neural Network and Computing-in-Memory Architectures
86 -- 91Gadi Singer. Emerging Technology and Engineering Challenges of Artificial Intelligence Deep Scheming: New Requirements for Containing Artificial Intelligence Misalignment
92 -- 97Jianming Tong. Breaking Rules, Building Trust: A Fireside Chat With Prof. Todd Austin
98 -- 101Ruby B. Lee, Charles Neuhauser, Timothy M. Pinkston. Michael J. Flynn: Founder of ISCA, TCCA and SIGARCH
102 -- 106Joshua J. Yi. A Review of Wisconsin Alumni Research Foundation v. Apple - Part VIII
107 -- 109Shane Greenstein. Frontier Pick-and-Shovel Markets