Zobrazeno 1 - 10
of 2 215
pro vyhledávání: '"Fletcher, Christopher"'
Autor:
Dong, Kris Shengjun, Nikiforov, Dima, Soedarmadji, Widyadewi, Nguyen, Minh, Fletcher, Christopher, Shao, Yakun Sophia
Empowering resource-limited robots to execute computationally intensive tasks such as locomotion and manipulation is challenging. This project provides a comprehensive design space exploration to determine optimal hardware computation architectures s
Externí odkaz:
http://arxiv.org/abs/2410.12142
Autor:
Hsiao, Yao, Nikoleris, Nikos, Khyzha, Artem, Mulligan, Dominic P., Petri, Gustavo, Fletcher, Christopher W., Trippel, Caroline
The Check tools automate formal memory consistency model and security verification of processors by analyzing abstract models of microarchitectures, called $\mu$SPEC models. Despite the efficacy of this approach, a verification gap between $\mu$SPEC
Externí odkaz:
http://arxiv.org/abs/2409.19478
Autor:
Nayak, Nandeeka, Wu, Xinrui, Odemuyiwa, Toluwanimi O., Pellauer, Michael, Emer, Joel S., Fletcher, Christopher W.
Attention for transformers is a critical workload that has recently received significant "attention" as a target for custom acceleration. Yet, while prior work succeeds in reducing attention's memory-bandwidth requirements, it creates load imbalance
Externí odkaz:
http://arxiv.org/abs/2406.10491
Publikováno v:
29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2024), Volume 2, pages 582-600, La Jolla, CA, USA, May 2024
Last-level cache side-channel attacks have been mostly demonstrated in highly-controlled, quiescent local environments. Hence, it is unclear whether such attacks are feasible in a production cloud environment. In the cloud, side channels are flooded
Externí odkaz:
http://arxiv.org/abs/2405.12469
Publikováno v:
In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS '23). Association for Computing Machinery, New York, NY, USA, 2053-2067
Speculative execution attacks undermine the security of constant-time programming, the standard technique used to prevent microarchitectural side channels in security-sensitive software such as cryptographic code. Constant-time code must therefore al
Externí odkaz:
http://arxiv.org/abs/2312.09336
Autor:
Nayak, Nandeeka, Odemuyiwa, Toluwanimi O., Ugare, Shubham, Fletcher, Christopher W., Pellauer, Michael, Emer, Joel S.
Over the past few years, the explosion in sparse tensor algebra workloads has led to a corresponding rise in domain-specific accelerators to service them. Due to the irregularity present in sparse tensors, these accelerators employ a wide variety of
Externí odkaz:
http://arxiv.org/abs/2304.07931
Autor:
Dylewsky, Daniel, Lenton, Timothy M., Scheffer, Marten, Bury, Thomas M., Fletcher, Christopher G., Anand, Madhur, Bauch, Chris T.
The potential for complex systems to exhibit tipping points in which an equilibrium state undergoes a sudden and often irreversible shift is well established, but prediction of these events using standard forecast modeling techniques is quite difficu
Externí odkaz:
http://arxiv.org/abs/2206.00060