Abstract is missing.
- REMOC: efficient request managements for on-chip memories of GPUsBingchao Li, Jizeng Wei. 1-11 [doi]
- Micro BTB: a high performance and storage efficient last-level branch target buffer for serversVishal Gupta 0006, Biswabandan Panda. 12-20 [doi]
- STIFF: thermally safe temperature effect inversion aware FinFET based multi-coreShounak Chakraborty 0001, Vassos Soteriou, Magnus Själander. 21-29 [doi]
- NTTGen: a framework for generating low latency NTT implementations on FPGAYang Yang 0111, Sanmukh R. Kuppannagari, Rajgopal Kannan, Viktor K. Prasanna. 30-39 [doi]
- FPGA acceleration of deep reinforcement learning using on-chip replay managementYuan Meng, Chi Zhang 0022, Viktor K. Prasanna. 40-48 [doi]
- SIMD support to improve eclipse OpenJ9 performance on the AArch64 platformMd Alvee Noor, Kenneth B. Kent, Kazuhiro Konno, Daryl Maier. 49-57 [doi]
- Patient-centered cross-enterprise document sharing and dynamic consent framework using consortium blockchain and ciphertext-policy attribute-based encryptionLiang Zhang, Haibin Kan, Honglan Huang. 58-66 [doi]
- Evaluating fork after withholding (FAW) attack in BitcoinRunkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Haoran Zhu. 67-74 [doi]
- Where's Waldo?: identifying anomalous behavior of data-only attacks using hardware featuresGildo Torres, Chen Liu 0001. 75-84 [doi]
- Lazy repair with temporary redundancy(LRTR): reducing repair network traffic in erasure-coded storageLongpan Luo, Yujuan Tan, Duo Liu, Moming Duan, Weilue Wang, Yu Wu, Xianzhang Chen. 85-93 [doi]
- moTuner: a compiler-based auto-tuning approach for mixed-precision operatorsZewei Mo, Zejia Lin, XianWei Zhang, Yutong Lu. 94-102 [doi]
- Fine-grained address segmentation for attention-based variable-degree prefetchingPengmiao Zhang, Ajitesh Srivastava, Anant V. Nori, Rajgopal Kannan, Viktor K. Prasanna. 103-112 [doi]
- Magic state injection on the rotated surface codeLingling Lao, Ben Criger. 113-120 [doi]
- Practical approximate quantum multipliers for NISQ devicesSohrab Sajadimanesh, Jean Paul Latyr Faye, Ehsan Atoofian. 121-130 [doi]
- Efficient trimming for strongly connected components calculationDante Niewenhuis, Ana Lucia Varbanescu. 131-140 [doi]
- Enabling resource-efficient edge intelligence with compressive sensing-based deep learningAlina Machidon, Veljko Pejovic. 141-149 [doi]
- Deep reinforcement learning empowered multiple UAVs-assisted caching and offloading optimization in D2D wireless networksNa Lin, Hongzhi Qin, Junling Shi, Liang Zhao 0004. 150-158 [doi]
- Workload characterization of a time-series prediction system for spatio-temporal dataMilan Jain, Sayan Ghosh, Sai Pushpak Nandanoori. 159-168 [doi]
- A design methodology for fault-tolerant computing using astrocyte neural networksMurat Isik, Ankita Paul, M. Lakshmi Varshika, Anup Das 0001. 169-172 [doi]
- Return-oriented programming protection in the IBM POWER10José E. Moreira, Debapriya Chatterjee, Kattamuri Ekanadham, Arnold Flores. 173-176 [doi]
- FLEXDP: flexible frequency scaling for energy-delay product optimization of GPU applicationsKaijie Fan, Biagio Cosenza, Ben H. H. Juurlink. 177-180 [doi]
- Orchestra: adaptively accelerating distributed deep learning in heterogeneous environmentsHaizhou Du, Sheng Huang, Qiao Xiang. 181-184 [doi]
- REC: REtime convolutional layers in energy harvesting ReRAM-based CNN acceleratorsKunyu Zhou, Keni Qiu. 185-188 [doi]
- BILP-Q: quantum coalition structure generationSupreeth Mysore Venkatesh, Antonio Macaluso, Matthias Klusch. 189-192 [doi]
- On the use of hardware accelerators in QC-MDPC code-based cryptographyAndrea Galimberti, Davide Galli, Gabriele Montanaro, William Fornaciari, Davide Zoni. 193-194 [doi]
- Always-on instrumentation for application introspection in HPCAmir Raoofy, Josef Weidendorfer, Michael Ott 0001. 195-196 [doi]
- Multi-level anomaly prediction in Tier-0 datacenter: a deep learning approachMohsen Seyedkazemi Ardebili, Andrea Bartolini, Luca Benini. 197-198 [doi]
- Artificial versus spiking neural networks for reinforcement learning in UAV obstacle avoidanceLuca Zanatta, Francesco Barchi, Andrea Bartolini, Andrea Acquaviva. 199-200 [doi]
- SODA-OPT an MLIR based flow for co-design and high-level synthesisNicolas Bohm Agostini, Serena Curzel, David R. Kaeli, Antonino Tumeo. 201-202 [doi]
- Semi-supervised anomaly detection on a Tier-0 HPC systemMartin Molan, Andrea Borghesi, Luca Benini, Andrea Bartolini. 203-204 [doi]
- Anomaly detection to improve security of big data analyticsTom Slooff, Francesco Regazzoni 0001, Fabien Brocheton, Antonio Parodi, Radim Cmar. 205-206 [doi]
- Meet Monte Cimone: exploring RISC-V high performance compute clustersFederico Ficarelli, Andrea Bartolini, Emanuele Parisi, Francesco Beneventi, Francesco Barchi, Daniele Gregori, Fabrizio Magugliani, Marco Cicala, Cosimo Gianfreda, Daniele Cesarini, Andrea Acquaviva, Luca Benini. 207-208 [doi]
- Hardware acceleration of complex machine learning models through modern high-level synthesisSerena Curzel, Nicolas Bohm Agostini, Antonino Tumeo, Fabrizio Ferrandi. 209-210 [doi]
- An extreme-scale virtual screening platform for drug discoveryDavide Gadioli, Emanuele Vitali, Federico Ficarelli, Chiara Latini, Candida Manelfi, Carmine Talarico, Cristina Silvano, Andrea Rosario Beccari, Gianluca Palermo. 211-212 [doi]
- Reducing neural architecture search spaces with training-free statistics and computational graph clusteringThorir Mar Ingolfsson, Mark Vero, Xiaying Wang, Lorenzo Lamberti, Luca Benini, Matteo Spallanzani. 213-214 [doi]
- Layout-oriented radiation effects mitigation in RISC-V soft processorEleonora Vacca, Corrado De Sio, Sarah Azimi. 215-220 [doi]
- Opportunities and challenges of AI on satellite processing unitsMax Ghiglione, Vittorio Serra. 221-224 [doi]
- Benchmarking and feasibility aspects of machine learning in space systemsAmir Raoofy, Gabriel Dax, Vittorio Serra, Max Ghiglione, Martin Werner 0001, Carsten Trinitis. 225-226 [doi]
- MicroPython as a satellite control languageHanna Vivien Schwarzwald, Sebastian Würl, Martin Langer, Carsten Trinitis. 227-229 [doi]
- Compilation on the GPU?: a feasibility studyRobin F. Voetter, Marcel Huijben, Kristian F. D. Rietveld. 230-236 [doi]
- Noise-adaptive quantum compilation strategies evaluated with application-motivated benchmarksDavide Ferrari, Michele Amoretti. 237-243 [doi]
- Towards neural architecture-aware exploration of compiler optimizations in a deep learning {graph} compilerGaurav Verma, Swetang Finviya, Abid M. Malik, Murali Emani, Barbara M. Chapman. 244-250 [doi]
- Towards superior software portability with SHAD and HPX C++ librariesNanmiao Wu, Vito Giovanni Castellana, Hartmut Kaiser. 251-257 [doi]
- Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technologyArthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens. 258-262 [doi]
- A secure authentication scheme based on differential public PUFShengyu Duan, Gaole Sai. 263-269 [doi]
- SmartFusion2 SoC as a security module for the IoT worldAlexandre Rodrigues, João Carlos Resende, Ricardo Chaves. 270-278 [doi]
- An attentive interpretable approach for identifying and quantifying malware-infected internet-scale IoT bots behind a NATChristelle Nader, Elias Bou-Harb. 279-286 [doi]
- Low-latency implementation of the GIFT cipher on RISC-V architecturesGheorghe Pojoga, Kostas Papagiannopoulos. 287-295 [doi]
- Cyber-physical firewall: monitoring and controlling the threats caused by malicious analog signalsRyo Iijima, Tatsuya Takehisa, Tatsuya Mori. 296-304 [doi]