Zobrazeno 1 - 10
of 49 739
pro vyhledávání: '"020202 computer hardware & architecture"'
Publikováno v:
ASP-DAC
This is the first work that incorporates recent advancements in "explainability" of machine learning (ML) to build a routing obfuscator called ObfusX. We adopt a recent metric---the SHAP value---which explains to what extent each layout feature can r
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457235
EUROCRYPT (2)
Advances in Cryptology – EUROCRYPT 2020
EUROCRYPT (2)
Advances in Cryptology – EUROCRYPT 2020
Oblivious RAM (ORAM), first introduced in the ground-breaking work of Goldreich and Ostrovsky (STOC ’87 and J. ACM ’96) is a technique for provably obfuscating programs’ access patterns, such that the access patterns leak no information about t
Autor:
Paolo Rech, George N. Papadimitriou, Pablo Bodmann, Rubens Luiz Rech Junior, Dimitris Gizopoulos
Publikováno v:
IEEE Transactions on Computers. 71:2358-2369
Extensive research efforts are being carried out to evaluate and improve the reliability of computing devices, either through beam experiments or simulation-based fault injection. Unfortunately, it is still largely unclear to which extend fault injec
Publikováno v:
IEEE Transactions on Computers. 71:2156-2162
With the growing effort to reduce power consumption in machines, fault tolerance becomes more of a concern. This holds particularly for large-scale computing, where execution failures due to soft faults waste excessive time and resources. These large
Autor:
Haralampos-G. Stratigopoulos, Julian Leonhard, Ozgur Sinanoglu, Hassan Aboushady, Shadi Turk, Nimisha Limaye, Alan Rodrigo Diaz Rizo, Alhassan Sayed
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:2449-2462
The design and manufacturing steps of a chip typically involve several parties. For example, a chip may comprise several third-party Intellectual Property (IP) cores and the Integrated Circuit (IC) fabrication may be outsourced to a third-party found
Publikováno v:
ICCAD
With the aggressive and amazing scaling of the feature size of semiconductors, hotspot detection has become a crucial and challenging problem in the generation of optimized mask design for better printability. Machine learning techniques, especially
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2021, pp.1-14. ⟨10.1109/TCAD.2021.3101406⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, pp.1-14. ⟨10.1109/TCAD.2021.3101406⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2021, pp.1-14. ⟨10.1109/TCAD.2021.3101406⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021, pp.1-14. ⟨10.1109/TCAD.2021.3101406⟩
International audience; Since several decades, fault tolerance has become a major research field due to transistor shrinking and core number increasing in System-on-Chip (SoC). Especially, faults occurring to Network-on-Chips (NoCs) of those systems
Reinforcement learning is a promising approach for manufacturing processes. Process knowledge can be gained automatically, and autonomous tuning of control is possible. However, the use of reinforcement learning in a production environment imposes sp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::66fbd0946a42277c8ffe2c7181befe15
Autor:
Shailesh K S, P Suresh
Personalized web is used in all functional domains. Personalized web consists of private pages and pages which personalize the content, data and information based on user’s context and preferences. Personalization engines use users’ implicit and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::14aac695dbeb50d83f145d8599743744
Autor:
Ankit Wagle, Sarma Vrudhula
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41:1855-1867