Secureml: A system for scalable privacy-preserving machine learning
P Mohassel, Y Zhang - 2017 IEEE symposium on security and …, 2017 - ieeexplore.ieee.org
Machine learning is widely used in practice to produce predictive models for applications
such as image processing, speech and text recognition. These models are more accurate …
such as image processing, speech and text recognition. These models are more accurate …
Elevator-first: A deadlock-free distributed routing algorithm for vertically partially connected 3d-nocs
F Dubois, A Sheibanyrad, F Petrot… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In this paper, we propose a distributed routing algorithm for vertically partially connected
regular 2D topologies of different shapes and sizes (eg, 2D mesh, torus, ring). The …
regular 2D topologies of different shapes and sizes (eg, 2D mesh, torus, ring). The …
Fault-tolerant adaptive routing in dragonfly networks
D Xiang, B Li, Y Fu - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
Dragonfly networks have been widely used in the current high-performance computers or
high-end servers. Fault-tolerant routing in dragonfly networks is essential. The rich …
high-end servers. Fault-tolerant routing in dragonfly networks is essential. The rich …
Addressing manufacturing challenges with cost-efficient fault tolerant routing
The high-performance computing domain is enriching with the inclusion of Networks-on-chip
(NoCs) as a key component of many-core (CMPs or MPSoCs) architectures. NoCs face the …
(NoCs) as a key component of many-core (CMPs or MPSoCs) architectures. NoCs face the …
Don't call us, we'll call you: Characterizing callbacks in JavaScript
JavaScript is a popular language for developing web applications and is increasingly used
for both client-side and server-side application logic. The JavaScript runtime is inherently …
for both client-side and server-side application logic. The JavaScript runtime is inherently …
Palmprint identification algorithm using Hu invariant moments and Otsu binarization
JS Noh, KH Rhee - … on Computer and Information Science (ICIS …, 2005 - ieeexplore.ieee.org
Recently, biometrics-based personal identification is regarded as an effective method of
person's identity with recognition automation and high performance. In this paper, the …
person's identity with recognition automation and high performance. In this paper, the …
[图书][B] The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust Into Electronic …
O Lysne - 2018 - library.oapen.org
To date, devices deliberately designed to turn against their owners have been confined to
fiction. The introduction of electronic devices into our daily lives and into the critical …
fiction. The introduction of electronic devices into our daily lives and into the critical …
Practical deadlock-free fault-tolerant routing in meshes based on the planar network fault model
The number of virtual channels required for deadlock-free routing is important for cost-
effective and high-performance system design. The planar adaptive routing scheme is an …
effective and high-performance system design. The planar adaptive routing scheme is an …
Zonedefense: A fault-tolerant routing for 2-d meshes without virtual channels
Fault-tolerant routing is usually used to provide reliable on-chip communication for many-
core processors. This paper focuses on a special class of algorithms that do not use virtual …
core processors. This paper focuses on a special class of algorithms that do not use virtual …
Understanding the interconnection network of SpiNNaker
SpiNNaker is a massively parallel architecture designed to model large-scale spiking neural
networks in (biological) real-time. Its design is based around ad-hoc multi-core System-on …
networks in (biological) real-time. Its design is based around ad-hoc multi-core System-on …