Authors: Manuscript Submission, Editorial Manager
BrillPublishing
Towards Optimal Multi-Level Checkpointing Chinese (0717)
We provide a framework to analyze multi-level checkpointing protocols, by formally defining a k-level checkpointing pattern.
ieeeComputerSociety
Video for IEEE Transactions on Robotics 2010
We present a computational framework for automatic synthesis of control and communication strategies for a robotic team from task specifications given as ...
HyNeSslab
Everything You Need to Know About 5G
Millimeter waves, massive MIMO, full duplex, beamforming, and small cells are just a few of the technologies that could enable ultrafast 5G networks.
IEEE Spectrum
On-Chip Communication Network for Efficient Training of Deep Convolutional Networks...(Chinese)
Convolutional Neural Networks (CNNs) have shown a great deal of success in diverse application domains including computer vision, speech recognition, and ...
ieeeComputerSociety
Top 10 Programming Languages In 2020 | Best Programming Languages To Learn In 2020 | Edureka
Edureka Online Training on Trending Programming Languages: https://www.edureka.co Top 10 Certifications for 2021: ...
edureka!
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Dapper: An Adaptive Manager for Large-Capacity Persistent Memory (Chinese)
In-memory computing has inspired researchers to consider integrating large-capacity persistent memory (PM) into the main memory subsystem. However ...
ieeeComputerSociety
Revisiting Vulnerability Analysis in Modern Microprocessors
The notion of Architectural Vulnerability Factor (AVF) has been extensively used to evaluate various aspects of design robustness. While AVF has been a very ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems Chinese 0417
Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time systems in that ...
ieeeComputerSociety
Overview of the June 2015 TC featured paper "SpiNNaker—Programming Model" in Chinese
SpiNNaker is a multi-core computing engine, with a bespoke and specialised communication infrastructure that supports almost perfect scalability up to a hard ...
ieeeComputerSociety
Arb: Efficient Arbitrary-Precision 2 Midpoint-Radius Interval Arithmetic Spanish (0817)
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball arithmetic. It supports real and complex ...
ieeeComputerSociety
A Compositional Approach for Verifying Protocols Running on On-Chip Networks (0718) Chinese
In modern many-core architectures, advanced on-chip networks provide the means of communication for the cores. This greatly complicates the design and ...
ieeeComputerSociety
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip-Chinese
Reliability is one of the most challenging problems in the context of three-dimensional network-on-chip (3D NoC) systems. Reliability analysis is prominent for ...
ieeeComputerSociety
Enhancing Energy Efficiency of Multimedia Applications in Heterogeneous Mobile...Chinese (1117)
Recent smart devices have adopted heterogeneous multi-core processors which have high-performance big cores and 6 low-power small cores. Unfortunately ...
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors Spanish (0318)
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Advance Virtual Channel Reservation Chinese 0920
We present a smart communication service called Advance Virtual Channel Reservation (AVCR) to provide a highway to target packets, which can greatly ...
ieeeComputerSociety
Sustainable High-Performance Computing | Ozalp Babaoglu | Talks at Google
As technological progress brings us ever closer to achieving exaFLOP executions in High-Performance Computing (HPC) systems, new challenges emerge for ...
Talks at Google
Augmented Reading: Conclusions
In this video, author Paolo Montuschi summarizes the key concepts of the article "Augmented Reading: The Present and Future of Electronic Scientific ...
ieeeComputerSociety
2018 06 spanish
ieeeComputerSociety
Utilization Aware Power Management in Reliable and Aggressive Chip Multi Processors - March Chinese
With increasing transistor density on a single chip, processor design in the nanoscale era is hitting power and frequency walls. Due to these challenges, ...
ieeeComputerSociety
Progressive Congestion Management Based on Packet Marking and Validation Techniques
Congestion management in multistage interconnection networks is a serious problem not completely solved. In order to avoid the degradation of network ...
ieeeComputerSociety
IEEE Transactions on Intelligent Transportation Systems
Simulation results of a publication entitled Time-Optimal Maneuver Planning in Automatic Parallel Parking Using a Simultaneous Dynamic Optimization ...
柏李
CppCon 2016: Matt P. Dziubinski “Computer Architecture, C++, and High Performance"
http://CppCon.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/cppcon/cppcon2016 — With the ...
CppCon
In Their Own Words: Naga Durga Prasad Avirneni, and Arun Somani
The threat of soft error induced system failure in computing systems has become more prominent, as we adopt ultra-deep submicron process technologies.
ieeeComputerSociety
Extending Unix Pipelines to Graphs
The Unix shell dgsh provides an expressive way to construct sophisticated and efficient non-linear pipelines. You can find the (open-access) full paper at ...
Diomidis Spinellis
Static Instruction Scheduling for High Performance on Limited Hardware (0518)
Complex out-of-order (OoO) processors have been designed to overcome the restrictions of outstanding long-latency misses at the cost of increased energy ...
ieeeComputerSociety
Lecture 27. Multiprocessors - Carnegie Mellon - Computer Architecture 2015 - Onur Mutlu
Lecture 27. Multiprocessors Lecturer: Prof. Onur Mutlu (http://users.ece.cmu.edu/~omutlu/) Date: Apr 6th, 2015 Lecture 27 slides (pdf): ...
Carnegie Mellon Computer Architecture
Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...(Chinese)
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark ...
ieeeComputerSociety
Parallel Reproducible Summation
Reproducibility, i.e. getting bitwise identical floating point results from multiple runs of the same program, is a property that many users depend on either for ...
ieeeComputerSociety
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (0318) Chinese
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
TEDxESADE - Jonathan Wareham - Creativity Lost? Computers and The Crisis in Creative Work
Creativity Lost? Computers and the Crisis in Creative Work There is no need to exalt the new frontiers that information and communication technologies have ...
TEDx Talks
Why Do You Volunteer at the IEEE Computer Society?
Why contribute your time to the IEEE Computer Society? Find out what keeps IEEE Computer Society volunteers engaged, enthusiastic, and coming back year ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Spanish
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
IEEE CIS "How to publish your research": Kay Chen Tan
Location: IEEE Congress on Evolutionary Computation 2013 (http://www.cec2013.org/) Panel Discussion "How to publish your research", June 21, 4-6pm Chair: ...
CIS Cyprus
IEEE Transactions on Signal Processing Top #5 Facts
Rishika Janaki
Energy-Aware Adaptive Restore Schemes for MLC STT-RAM Cache (0517)-Chinese
For the sake of higher cell density while achieving near-zero standby power, recent research progress in Magnetic Tunneling Junction (MTJ) devices has ...
ieeeComputerSociety
A Compositional Approach for Verifying Protocols Running on On-Chip Networks (0718) Spanish
In modern many-core architectures, advanced on-chip networks provide the means of communication for the cores. This greatly complicates the design and ...
ieeeComputerSociety
Linear Branch Entropy: Characterizing and Optimizing Branch Behavior...0317 Spanish
In this paper, we propose linear branch entropy, a new metric for characterizing branch behavior. Linear branch entropy is independent of the configuration of a ...
ieeeComputerSociety
Minimizing Energy Consumption of Embedded Systems via Optimal Code Layout
As the gap between CPU and memory is widening every year, it is getting harder for CPU to obtain a timely response from main memory. At the same time, ...
ieeeComputerSociety
Contention-Aware Fair Scheduling for Asymmetric Single-ISA Multicore Systems (1218) Spanish
Asymmetric single-ISA multicore processors (AMPs), which integrate high-performance big cores and low-power small cores, were shown to deliver higher ...
ieeeComputerSociety