Zobrazeno 1 - 10
of 261
pro vyhledávání: '"Davis, James C."'
Autor:
Hasler, Ryan, Läufer, Konstantin, Thiruvathukal, George K., Peng, Huiyun, Robinson, Kyle, Davis, Kirsten, Lu, Yung-Hsiang, Davis, James C.
Computing systems are consuming an increasing and unsustainable fraction of society's energy footprint, notably in data centers. Meanwhile, energy-efficient software engineering techniques are often absent from undergraduate curricula. We propose to
Externí odkaz:
http://arxiv.org/abs/2411.08912
Formal verification provides mathematical guarantees that a software is correct. Design-level verification tools ensure software specifications are correct, but they do not expose defects in actual implementations. For this purpose, engineers use cod
Externí odkaz:
http://arxiv.org/abs/2410.14818
Autor:
Peng, Huiyun, Gupte, Arjun, Eliopoulos, Nicholas John, Ho, Chien Chou, Mantri, Rishi, Deng, Leo, Jiang, Wenxin, Lu, Yung-Hsiang, Läufer, Konstantin, Thiruvathukal, George K., Davis, James C.
Energy-efficient software helps improve mobile device experiences and reduce the carbon footprint of data centers. However, energy goals are often de-prioritized in order to meet other requirements. We take inspiration from recent work exploring the
Externí odkaz:
http://arxiv.org/abs/2410.09241
Autor:
Jajal, Purvish, Eliopoulos, Nick John, Chou, Benjamin Shiue-Hal, Thiravathukal, George K., Davis, James C., Lu, Yung-Hsiang
We propose Vision Token Turing Machines (ViTTM), an efficient, low-latency, memory-augmented Vision Transformer (ViT). Our approach builds on Neural Turing Machines and Token Turing Machines, which were applied to NLP and sequential visual understand
Externí odkaz:
http://arxiv.org/abs/2409.07613
Autor:
Schorlemmer, Taylor R., Burmane, Ethan H., Kalu, Kelechi G., Torres-Arias, Santiago, Davis, James C.
Software engineers integrate third-party components into their applications. The resulting software supply chain is vulnerable. To reduce the attack surface, we can verify the origin of components (provenance) before adding them. Cryptographic signat
Externí odkaz:
http://arxiv.org/abs/2407.03949
Autor:
Eliopoulos, Nick John, Jajal, Purvish, Davis, James C., Liu, Gaowen, Thiravathukal, George K., Lu, Yung-Hsiang
This paper investigates how to efficiently deploy vision transformers on edge devices for small workloads. Recent methods reduce the latency of transformer neural networks by removing or merging tokens, with small accuracy degradation. However, these
Externí odkaz:
http://arxiv.org/abs/2407.05941
Code signing enables software developers to digitally sign their code using cryptographic keys, thereby associating the code to their identity. This allows users to verify the authenticity and integrity of the software, ensuring it has not been tampe
Externí odkaz:
http://arxiv.org/abs/2406.15596
Autor:
Franke, Lucas, Liang, Huayu, Farzanehpour, Sahar, Brantly, Aaron, Davis, James C., Brown, Chris
Background: Governments worldwide are considering data privacy regulations. These laws, e.g. the European Union's General Data Protection Regulation (GDPR), require software developers to meet privacy-related requirements when interacting with users'
Externí odkaz:
http://arxiv.org/abs/2406.14724
Autor:
Bhuiyan, Masudul Hasan Masud, Çakar, Berk, Burmane, Ethan H, Davis, James C, Staicu, Cristian-Alexandru
Regular expression denial of service (ReDoS) is an asymmetric cyberattack that has become prominent in recent years. This attack exploits the slow worst-case matching time of regular expression (regex) engines. In the past, problematic regular expres
Externí odkaz:
http://arxiv.org/abs/2406.11618
This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separati
Externí odkaz:
http://arxiv.org/abs/2406.10109