default search action
CF 2020: Catania, Sicily, Italy
- Maurizio Palesi, Gianluca Palermo, Catherine Graves, Eishi Arima:
Proceedings of the 17th ACM International Conference on Computing Frontiers, CF 2020, Catania, Sicily, Italy, May 11-13, 2020. ACM 2020, ISBN 978-1-4503-7956-4
Approximate and transprecision computing
- Zayan Shaikh, Ehsan Atoofian:
Approximate trivial instructions. 1-9 - Andrea Borghesi, Giuseppe Tagliavini, Michele Lombardi, Luca Benini, Michela Milano:
Combining learning and optimization for transprecision computing. 10-18 - Jay P. Lim, Matan Shachnai, Santosh Nagarakatte:
Approximating trigonometric functions for posits using the CORDIC method. 19-28
Large-scale computing
- Konstantinos Iliakis, Helga Timko, Sotirios Xydis, Dimitrios Soudris:
Scale-out beam longitudinal dynamics simulations. 29-38 - Stefan Groth, Daniel Grünewald, Jürgen Teich, Frank Hannig:
A runtime system for finite element methods in a partitioned global address space. 39-48 - Felippe Vieira Zacarias, Rajiv Nishtala, Paul M. Carpenter:
Contention-aware application performance prediction for disaggregated memory systems. 49-59
System software and tools
- Yehia Arafa, Ammar ElWazir, Abdelrahman Elkanishy, Youssef Aly, Ayatelrahman Elsayed, Abdel-Hameed A. Badawy, Gopinath Chennupati, Stephan J. Eidenbenz, Nandakishore Santhi:
Verified instruction-level energy consumption measurement for NVIDIA GPUs. 60-70
Hardware design
- Ziyang Kang, Shiying Wang, Lei Wang, Shiming Li, Lianhua Qu, Wei Shi, Rui Gong, Weixia Xu:
Application-specific network-on-chip design space exploration framework for neuromorphic processor. 71-80 - Matheus A. Cavalcante, Andreas Kurth, Fabian Schuiki, Luca Benini:
Design of an open-source bridge between non-coherent burst-based and coherent cache-line-based memory systems. 81-88 - Rupam Mondal, Hau T. Ngo, James Shey, Ryan N. Rakvic, T. Owens Walker, Dane Brown:
Efficient architecture design for the AES-128 algorithm on embedded systems. 89-97 - Jonathan M. Baker, Casey Duckering, Alexander Hoover, Frederic T. Chong:
Time-sliced quantum circuit partitioning for modular architectures. 98-107
Quantum computing
- Irmi Sax, Sebastian Feld, Sebastian Zielinski, Thomas Gabor, Claudia Linnhoff-Popien, Wolfgang Mauerer:
Approximate approximation on a quantum annealer. 108-117 - Hristo N. Djidjev:
Automaton-based methodology for implementing optimization constraints for quantum annealing. 118-125 - Avradip Mandal, Arnab Roy, Sarvagya Upadhyay, Hayato Ushijima-Mwesigwa:
Compressed quadratization of higher order binary optimization problems. 126-131 - Alessandro Barenghi, Gerardo Pelosi:
Constant weight strings in constant time: a building block for code-based post-quantum cryptosystems. 132-141
Security and fault tolerance
- Meichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu:
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention. 142-149 - Leandro Santiago de Araújo, Leandro A. J. Marzulo, Tiago A. O. Alves, Felipe M. G. França, Israel Koren, Sandip Kundu:
Building a portable deeply-nested implicit information flow tracking. 150-157 - Xiaoxin Li, Jiazhen Li, Rui Hou, Dan Meng:
RCecker: a lightweight rule-based mechanism for backward control-flow integrity. 158-164 - Nasos Grigoropoulos, Manos Koutsoubelias, Spyros Lalis:
Byzantine fault tolerance for centrally coordinated missions with unmanned vehicles. 165-173
Machine learning applications
- Yicong Zhang, Mingyu Wang, Zhaolin Li:
An efficient object detection framework with modified dense connections for small objects optimizations. 174-181 - Frank Liu, Narasinga Rao Miniskar, Dwaipayan Chakraborty, Jeffrey S. Vetter:
Deffe: a data-efficient framework for performance characterization in domain-specific computing. 182-191 - Xu T. Liu, Mahantesh Halappanavar, Kevin J. Barker, Andrew Lumsdaine, Assefaw H. Gebremedhin:
Direction-optimizing label propagation and its application to community detection. 192-201
Data analytics and management
- Ping Gu, Meng Chow, Si Yu Shao:
Outlier detection based on sparse coding and neighbor entropy in high-dimensional space. 202-207 - Wen-Jie Li, Dejun Jiang, Jin Xiong, Yungang Bao:
HiLSM: an LSM-based key-value store for hybrid NVM-SSD storage systems. 208-216
Approximate and transprecision computing
- Nazareno Bruschi, Angelo Garofalo, Francesco Conti, Giuseppe Tagliavini, Davide Rossi:
Enabling mixed-precision quantized neural networks in extreme-edge devices. 217-220 - Marcos T. Leipnitz, Gabriel L. Nazar:
High-level synthesis of throughput-optimized and energy-efficient approximate designs. 221-224
Large-scale computing
- Yifan Shen, Ke Liu, Ziting Guo, Wenli Zhang, Guanghui Zhang, Vaneet Aggarwal, Mingyu Chen:
Freeway: an order-less user-space framework for non-real-time applications. 225-228 - Thamer Alrefai, Leandro Soares Indrusiak:
Management of container-based genetic algorithm workloads over cloud infrastructure. 229-232
System software and tools
- John D. Leidel, David Donofrio, Frank Conlon:
StoneCutter: a very high level instruction set design language. 233-236 - Ruchira Sasanka, Konstantinos Krommydas:
An evolutionary framework for automatic and guided discovery of algorithms. 237-240 - Engin Kayraklioglu, Jeff Anderson, Hamid Reza Imani, Volker J. Sorger, Tarek A. El-Ghazawi:
Software stack for an analog mesh computer: the case of a nanophotonic PDE accelerator. 241-244
Hardware design
- Luca Gemma, Martino Bernard, Mher Ghulinyan, Davide Brunelli:
Analysis of control and sensing interfaces in a photonic integrated chip solution for quantum computing. 245-248
Quantum computing
- Antonio Macaluso, Luca Clissa, Stefano Lodi, Claudio Sartori:
Quantum splines for non-linear approximations. 249-252
Machine learning applications
- Alberto Scionti, Simone Ciccia, Olivier Terzo:
SoundFactory: a framework for generating datasets for deep learning SELD algorithms. 253-256
Data analytics and management
- Xianglin Wei, Jianwei Liu, Junwei Wang, Yangang Wang, Jianhua Fan:
Similarity-aware popularity-based caching in wireless edge computing. 257-260 - Hui Huang, Yueyuan Jin, Ruonan Rao:
SCoEmbeddings: encoding sentiment information into contextualized embeddings for sentiment analysis. 261-264 - Shinichi Yamagiwa, Eisaku Hayakawa, Koichi Marumo:
Adaptive entropy coding method for stream-based lossless data compression. 265-268
WORKSHOP SESSION: Papers from co-located workshops: Malicious software and hardware in internet of things (MAL-IoT'20)
- Alessandro Barenghi, Gerardo Pelosi:
A comprehensive analysis of constant-time polynomial inversion for post-quantum cryptosystems. 269-276 - Alexander Bajic, Georg T. Becker:
A critical view on moving target defense and its analogies. 277-283
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.