Secureml: A system for scalable privacy-preserving machine learning

P Mohassel, Y Zhang - 2017 IEEE symposium on security and …, 2017 - ieeexplore.ieee.org
Machine learning is widely used in practice to produce predictive models for applications
such as image processing, speech and text recognition. These models are more accurate …

Elevator-first: A deadlock-free distributed routing algorithm for vertically partially connected 3d-nocs

F Dubois, A Sheibanyrad, F Petrot… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In this paper, we propose a distributed routing algorithm for vertically partially connected
regular 2D topologies of different shapes and sizes (eg, 2D mesh, torus, ring). The …

Fault-tolerant adaptive routing in dragonfly networks

D Xiang, B Li, Y Fu - IEEE Transactions on Dependable and …, 2017 - ieeexplore.ieee.org
Dragonfly networks have been widely used in the current high-performance computers or
high-end servers. Fault-tolerant routing in dragonfly networks is essential. The rich …

Addressing manufacturing challenges with cost-efficient fault tolerant routing

S Rodrigo, J Flich, A Roca, S Medardoni… - 2010 Fourth ACM …, 2010 - ieeexplore.ieee.org
The high-performance computing domain is enriching with the inclusion of Networks-on-chip
(NoCs) as a key component of many-core (CMPs or MPSoCs) architectures. NoCs face the …

Don't call us, we'll call you: Characterizing callbacks in JavaScript

K Gallaba, A Mesbah… - 2015 ACM/IEEE …, 2015 - ieeexplore.ieee.org
JavaScript is a popular language for developing web applications and is increasingly used
for both client-side and server-side application logic. The JavaScript runtime is inherently …

Palmprint identification algorithm using Hu invariant moments and Otsu binarization

JS Noh, KH Rhee - … on Computer and Information Science (ICIS …, 2005 - ieeexplore.ieee.org
Recently, biometrics-based personal identification is regarded as an effective method of
person's identity with recognition automation and high performance. In this paper, the …

[图书][B] The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust Into Electronic …

O Lysne - 2018 - library.oapen.org
To date, devices deliberately designed to turn against their owners have been confined to
fiction. The introduction of electronic devices into our daily lives and into the critical …

Practical deadlock-free fault-tolerant routing in meshes based on the planar network fault model

D Xiang, Y Zhang, Y Pan - IEEE Transactions on Computers, 2008 - ieeexplore.ieee.org
The number of virtual channels required for deadlock-free routing is important for cost-
effective and high-performance system design. The planar adaptive routing scheme is an …

Zonedefense: A fault-tolerant routing for 2-d meshes without virtual channels

B Fu, Y Han, H Li, X Li - IEEE Transactions on Very Large Scale …, 2013 - ieeexplore.ieee.org
Fault-tolerant routing is usually used to provide reliable on-chip communication for many-
core processors. This paper focuses on a special class of algorithms that do not use virtual …

Understanding the interconnection network of SpiNNaker

J Navaridas, M Luján, J Miguel-Alonso… - Proceedings of the 23rd …, 2009 - dl.acm.org
SpiNNaker is a massively parallel architecture designed to model large-scale spiking neural
networks in (biological) real-time. Its design is based around ad-hoc multi-core System-on …