Zobrazeno 1 - 10
of 202
pro vyhledávání: '"Alaghi A"'
Autor:
Zhu, Shaowei, Kim, Hyo Jin, Monge, Maurizio, Suh, G. Edward, Alaghi, Armin, Reagen, Brandon, Lee, Vincent
Localization and mapping is a key technology for bridging the virtual and physical worlds in augmented reality (AR). Localization and mapping works by creating and querying maps made of anchor points that enable the overlay of these two worlds. As a
Externí odkaz:
http://arxiv.org/abs/2203.13308
Homomorphic encryption (HE) is a privacy-preserving technique that enables computation directly over ciphertext. Unfortunately, a key challenge for HE is that implementations can be impractically slow and have limits on computation that can be effici
Externí odkaz:
http://arxiv.org/abs/2203.02547
Autor:
Sima Besharat, Ali Jafari, Kosar Kordkatuli, Helia Mardani, Fatemeh Mehdipoor, Pardis Bakhtiari Jami, Maryam Abbastabar, Mohammadali Vakili, Alireza Alaghi
Publikováno v:
BMJ Open, Vol 14, Iss 7 (2024)
Introduction Heart diseases constitute a significant global public health concern. Cardiovascular diseases (CVDs) are characterised by disruptions in blood circulation and are notably prevalent among adults exposed to Westernised diets. Ginseng, a me
Externí odkaz:
https://doaj.org/article/12aac151dfc9402dbdb2388224fa6c67
Implementing image processing algorithms using FPGAs or ASICs can improve energy efficiency by orders of magnitude over optimized CPU, DSP, or GPU code. These efficiency improvements are crucial for enabling new applications on mobile power-constrain
Externí odkaz:
http://arxiv.org/abs/2110.12106
Autor:
Dangwal, Deeksha, Lee, Vincent T., Kim, Hyo Jin, Shen, Tianwei, Cowan, Meghan, Shah, Rajvi, Trippel, Caroline, Reagen, Brandon, Sherwood, Timothy, Balntas, Vasileios, Alaghi, Armin, Ilg, Eddy
As autonomous driving and augmented reality evolve, a practical concern is data privacy. In particular, these applications rely on localization based on user images. The widely adopted technology uses local feature descriptors, which are derived from
Externí odkaz:
http://arxiv.org/abs/2105.03812
Autor:
Dangwal, Deeksha, Cowan, Meghan, Alaghi, Armin, Lee, Vincent T., Reagen, Brandon, Trippel, Caroline
Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand
Externí odkaz:
http://arxiv.org/abs/2105.00378
Autor:
Isik, Berivan, Choi, Kristy, Zheng, Xin, Weissman, Tsachy, Ermon, Stefano, Wong, H. -S. Philip, Alaghi, Armin
Compression and efficient storage of neural network (NN) parameters is critical for applications that run on resource-constrained devices. Despite the significant progress in NN model compression, there has been considerably less investigation in the
Externí odkaz:
http://arxiv.org/abs/2102.07725
Autor:
Cowan, Meghan, Dangwal, Deeksha, Alaghi, Armin, Trippel, Caroline, Lee, Vincent T., Reagen, Brandon
Homomorphic encryption (HE) is a privacy-preserving technique that enables computation directly on encrypted data. Despite its promise, HE has seen limited use due to performance overheads and compilation challenges. Recent work has made significant
Externí odkaz:
http://arxiv.org/abs/2101.07841
Stochastic computing (SC) is a high density, low-power computation technique which encodes values as unary bitstreams instead of binary-encoded (BE) values. Practical SC implementations require deterministic or pseudo-random number sequences which ar
Externí odkaz:
http://arxiv.org/abs/1902.05971
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.