Abstract is missing.
- Approximate trivial instructionsZayan Shaikh, Ehsan Atoofian. 1-9 [doi]
- Combining learning and optimization for transprecision computingAndrea Borghesi, Giuseppe Tagliavini, Michele Lombardi 0001, Luca Benini, Michela Milano. 10-18 [doi]
- Approximating trigonometric functions for posits using the CORDIC methodJay P. Lim, Matan Shachnai, Santosh Nagarakatte. 19-28 [doi]
- Scale-out beam longitudinal dynamics simulationsKonstantinos Iliakis, Helga Timko, Sotirios Xydis, Dimitrios Soudris. 29-38 [doi]
- A runtime system for finite element methods in a partitioned global address spaceStefan Groth, Daniel Grünewald, Jürgen Teich, Frank Hannig. 39-48 [doi]
- Contention-aware application performance prediction for disaggregated memory systemsFelippe Vieira Zacarias, Rajiv Nishtala, Paul Carpenter. 49-59 [doi]
- Verified instruction-level energy consumption measurement for NVIDIA GPUsYehia Arafa, Ammar ElWazir, Abdelrahman Elkanishy, Youssef Aly, Ayatelrahman Elsayed, Abdel-Hameed A. Badawy, Gopinath Chennupati, Stephan J. Eidenbenz, Nandakishore Santhi. 60-70 [doi]
- Application-specific network-on-chip design space exploration framework for neuromorphic processorZiyang Kang, Shiying Wang, Lei Wang, Shiming Li, Lianhua Qu, Wei Shi, Rui Gong, Weixia Xu. 71-80 [doi]
- Design of an open-source bridge between non-coherent burst-based and coherent cache-line-based memory systemsMatheus A. Cavalcante, Andreas Kurth, Fabian Schuiki, Luca Benini. 81-88 [doi]
- Efficient architecture design for the AES-128 algorithm on embedded systemsRupam Mondal, Hau T. Ngo, James Shey, Ryan N. Rakvic, T. Owens Walker, Dane Brown. 89-97 [doi]
- Time-sliced quantum circuit partitioning for modular architecturesJonathan M. Baker, Casey Duckering, Alexander Hoover, Frederic T. Chong. 98-107 [doi]
- Approximate approximation on a quantum annealerIrmi Sax, Sebastian Feld, Sebastian Zielinski, Thomas Gabor, Claudia Linnhoff-Popien, Wolfgang Mauerer. 108-117 [doi]
- Automaton-based methodology for implementing optimization constraints for quantum annealingHristo Djidjev. 118-125 [doi]
- Compressed quadratization of higher order binary optimization problemsAvradip Mandal, Arnab Roy 0001, Sarvagya Upadhyay, Hayato Ushijima-Mwesigwa. 126-131 [doi]
- Constant weight strings in constant time: a building block for code-based post-quantum cryptosystemsAlessandro Barenghi, Gerardo Pelosi. 132-141 [doi]
- Terminator: a data-level hybrid framework for intellectual property theft detection and preventionMeichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu. 142-149 [doi]
- Building a portable deeply-nested implicit information flow trackingLeandro Santiago de Araújo, Leandro A. J. Marzulo, Tiago A. O. Alves, Felipe M. G. França, Israel Koren, Sandip Kundu. 150-157 [doi]
- RCecker: a lightweight rule-based mechanism for backward control-flow integrityXiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng. 158-164 [doi]
- Byzantine fault tolerance for centrally coordinated missions with unmanned vehiclesNasos Grigoropoulos, Manos Koutsoubelias, Spyros Lalis. 165-173 [doi]
- An efficient object detection framework with modified dense connections for small objects optimizationsYicong Zhang, Mingyu Wang, Zhaolin Li. 174-181 [doi]
- Deffe: a data-efficient framework for performance characterization in domain-specific computingFrank Liu, Narasinga Rao Miniskar, Dwaipayan Chakraborty, Jeffrey S. Vetter. 182-191 [doi]
- Direction-optimizing label propagation and its application to community detectionXu T. Liu, Mahantesh Halappanavar, Kevin J. Barker, Andrew Lumsdaine, Assefaw H. Gebremedhin. 192-201 [doi]
- Outlier detection based on sparse coding and neighbor entropy in high-dimensional spacePing Gu, Meng Chow, Si Yu Shao. 202-207 [doi]
- HiLSM: an LSM-based key-value store for hybrid NVM-SSD storage systemsWen-Jie Li, Dejun Jiang, Jin Xiong, Yungang Bao. 208-216 [doi]
- Enabling mixed-precision quantized neural networks in extreme-edge devicesNazareno Bruschi, Angelo Garofalo, Francesco Conti 0001, Giuseppe Tagliavini, Davide Rossi. 217-220 [doi]
- High-level synthesis of throughput-optimized and energy-efficient approximate designsMarcos T. Leipnitz, Gabriel L. Nazar. 221-224 [doi]
- Freeway: an order-less user-space framework for non-real-time applicationsYifan Shen, Ke Liu, Ziting Guo, Wenli Zhang, Guanghui Zhang, Vaneet Aggarwal, Mingyu Chen 0001. 225-228 [doi]
- Management of container-based genetic algorithm workloads over cloud infrastructureThamer Alrefai, Leandro Soares Indrusiak. 229-232 [doi]
- StoneCutter: a very high level instruction set design languageJohn D. Leidel, David Donofrio, Frank Conlon. 233-236 [doi]
- An evolutionary framework for automatic and guided discovery of algorithmsRuchira Sasanka, Konstantinos Krommydas. 237-240 [doi]
- Software stack for an analog mesh computer: the case of a nanophotonic PDE acceleratorEngin Kayraklioglu, Jeff Anderson, Hamid Reza Imani, Volker J. Sorger, Tarek A. El-Ghazawi. 241-244 [doi]
- Analysis of control and sensing interfaces in a photonic integrated chip solution for quantum computingLuca Gemma, Martino Bernard, Mher Ghulinyan, Davide Brunelli. 245-248 [doi]
- Quantum splines for non-linear approximationsAntonio Macaluso, Luca Clissa, Stefano Lodi, Claudio Sartori 0001. 249-252 [doi]
- SoundFactory: a framework for generating datasets for deep learning SELD algorithmsAlberto Scionti, Simone Ciccia, Olivier Terzo. 253-256 [doi]
- Similarity-aware popularity-based caching in wireless edge computingXianglin Wei, Jianwei Liu 0002, Junwei Wang, Yangang Wang, Jianhua Fan. 257-260 [doi]
- SCoEmbeddings: encoding sentiment information into contextualized embeddings for sentiment analysisHui Huang, Yueyuan Jin, Ruonan Rao. 261-264 [doi]
- Adaptive entropy coding method for stream-based lossless data compressionShinichi Yamagiwa, Eisaku Hayakawa, Koichi Marumo. 265-268 [doi]
- A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystemsAlessandro Barenghi, Gerardo Pelosi. 269-276 [doi]
- A critical view on moving target defense and its analogiesAlexander Bajic, Georg T. Becker. 277-283 [doi]