Zobrazeno 1 - 10
of 229
pro vyhledávání: '"NIEMIER, MICHAEL"'
Autor:
Yin, Xunzhao, Barkam, Hamza Errahmouni, Müller, Franz, Jiang, Yuxiao, Imani, Mohsen, Abdulazhanov, Sukhrob, Vardar, Alptekin, Laleni, Nellie, Zhao, Zijian, Duan, Jiahui, Shi, Zhiguo, Joshi, Siddharth, Niemier, Michael, Hu, Xiaobo Sharon, Zhuo, Cheng, Kämpfe, Thomas, Ni, Kai
Neuro-symbolic artificial intelligence (AI) excels at learning from noisy and generalized patterns, conducting logical inferences, and providing interpretable reasoning. Comprising a 'neuro' component for feature extraction and a 'symbolic' component
Externí odkaz:
http://arxiv.org/abs/2410.15296
Processing-in-Memory (PIM) enhances memory with computational capabilities, potentially solving energy and latency issues associated with data transfer between memory and processors. However, managing concurrent computation and data flow within the P
Externí odkaz:
http://arxiv.org/abs/2408.15489
As the reliance on secure memory environments permeates across applications, memory encryption is used to ensure memory security. However, most effective encryption schemes, such as the widely used AES-CTR, inherently introduce extra overheads, inclu
Externí odkaz:
http://arxiv.org/abs/2402.15824
Autor:
Meng, Guangyu, Zhou, Ruyu, Liu, Liu, Liang, Peixian, Liu, Fang, Chen, Danny, Niemier, Michael, Hu, X. Sharon
Earth Mover's Distance (EMD) is an important similarity measure between two distributions, used in computer vision and many other application domains. However, its exact calculation is computationally and memory intensive, which hinders its scalabili
Externí odkaz:
http://arxiv.org/abs/2401.07378
Autor:
Aziz, Ahmedullah, Breyer, Evelyn T., Chen, An, Chen, Xiaoming, Datta, Suman, Gupta, Sumeet Kumar, Hoffmann, Michael, Hu, Xiaobo Sharon, Ionescu, Adrian, Jerry, Matthew, Mikolajick, Thomas, Mulaosmanovic, Halid, Ni, Kai, Niemier, Michael, O'Connor, Ian, Saha, Atanu, Slesazeck, Stefan, Thirumala, Sandeep Krishna, Yin, Xunzhao
In this paper, we consider devices, circuits, and systems comprised of transistors with integrated ferroelectrics. Said structures are actively being considered by various semiconductor manufacturers as they can address a large and unique design spac
Externí odkaz:
https://tud.qucosa.de/id/qucosa%3A76838
https://tud.qucosa.de/api/qucosa%3A76838/attachment/ATT-0/
https://tud.qucosa.de/api/qucosa%3A76838/attachment/ATT-0/
Autor:
Geng, Haoran, Mo, Jianqiao, Reis, Dayane, Takeshita, Jonathan, Jung, Taeho, Reagen, Brandon, Niemier, Michael, Hu, Xiaobo Sharon
Privacy has rapidly become a major concern/design consideration. Homomorphic Encryption (HE) and Garbled Circuits (GC) are privacy-preserving techniques that support computations on encrypted data. HE and GC can complement each other, as HE is more e
Externí odkaz:
http://arxiv.org/abs/2308.02648
Lattice-based cryptographic algorithms built on ring learning with error theory are gaining importance due to their potential for providing post-quantum security. However, these algorithms involve complex polynomial operations, such as polynomial mod
Externí odkaz:
http://arxiv.org/abs/2307.14557
Autor:
Liu, Che-Kai, Chen, Haobang, Imani, Mohsen, Ni, Kai, Kazemi, Arman, Laguna, Ann Franchesca, Niemier, Michael, Hu, Xiaobo Sharon, Zhao, Liang, Zhuo, Cheng, Yin, Xunzhao
In a number of machine learning models, an input query is searched across the trained class vectors to find the closest feature class vector in cosine similarity metric. However, performing the cosine similarities between the vectors in Von-Neumann m
Externí odkaz:
http://arxiv.org/abs/2207.12188
Autor:
Li, Mengyuan, Laguna, Ann Franchesca, Reis, Dayane, Yin, Xunzhao, Niemier, Michael, Hu, Xiaobo Sharon
Recommendation systems (RecSys) suggest items to users by predicting their preferences based on historical data. Typical RecSys handle large embedding tables and many embedding table related operations. The memory size and bandwidth of the convention
Externí odkaz:
http://arxiv.org/abs/2202.09433
This paper proposes IMCRYPTO, an in-memory computing (IMC) fabric for accelerating AES encryption and decryption. IMCRYPTO employs a unified structure to implement encryption and decryption in a single hardware architecture, with combined (Inv)SubByt
Externí odkaz:
http://arxiv.org/abs/2112.02231