Video for IEEE Transactions on Robotics 2010
We present a computational framework for automatic synthesis of control and communication strategies for a robotic team from task specifications given as ...
HyNeSslab
[IEEE Transactions on Magnetics & InterMag 2014] A micro-robot - Jinsoo Kim
IEEE Transactions on Magnetics IEEE International Magnetics Conference (INTERMAG Europe 2014) Micro-robot Jinsoo Kim, Center for Bionics Korea Institute ...
Jinsoo Kim
The Decline of IBM
We run this chis channel and a second channel TMIO Tesla ; we also run a website: TheMarketIsOpen.com This video is meant to be a documentary to be ...
The Market is Open
Special Section on Computer Arithmetic in IEEE TC
Call for papers for the special section on Computer Arithmetic in IEEE Transactions on Computers.
edwardDTU
Analytical Processor Performance and Power Modeling Using Micro-Architecture... Chinese 1216
Optimizing processors for (a) specific application(s) can substantially improve energy-efficiency. With the end of Dennard scaling, and the corresponding ...
ieeeComputerSociety
Analytical Processor Performance and Power Modeling Using Micro-Architecture...(1216)
Optimizing processors for (a) specific application(s) can substantially improve energy-efficiency. With the end of Dennard scaling, and the corresponding ...
ieeeComputerSociety
On-Chip Communication Network for Efficient Training of Deep Convolutional Networks...(Chinese)
Convolutional Neural Networks (CNNs) have shown a great deal of success in diverse application domains including computer vision, speech recognition, and ...
ieeeComputerSociety
Annelie Heuser - Prix de thèse de la Fondation Télécom
Candidature d'Annelie Heuser, Télécom ParisTech aux Prix des meilleures thèses 2016. Annelie Heuser a obtenu le Premier Prix des meilleures thèses.
Fondation Mines-Télécom
2018 IEEE Transaction Paper on Cloud : Top 4 Easy papers to Implement
Easy Paper to Implement: Paper 1 :Securing Cloud Data under Key Exposure. Paper 2: Fast Phrase Search for Encrypted Cloud Storage. Paper 3: A ...
Ashwini Cly
Wearable computers
Universalppts
Machine Intelligence - Lecture 18 (Evolutionary Algorithms)
SYDE 522 – Machine Intelligence (Winter 2019, University of Waterloo) Target Audience: Senior Undergraduate Engineering Students Instructor: Professor ...
Kimia Lab
Computer Networks: Crash Course Computer Science #28
Today we start a three episode arc on the rise of a global telecommunications network that changed the world forever. We're going to begin with computer ...
CrashCourse
Arb: Efficient Arbitrary-Precision 2 Midpoint-Radius Interval Arithmetic Chinese (0817)
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball arithmetic. It supports real and complex ...
ieeeComputerSociety
Deep Learning in Medical Imaging - Ben Glocker, Imperial College London
Machines capable of analysing and interpreting medical scans with super-human performance are within reach. Deep learning, in particular, has emerged as a ...
RE•WORK
Enhancing Energy Efficiency of Multimedia Applications in Heterogeneous Mobile...Chinese (1117)
Recent smart devices have adopted heterogeneous multi-core processors which have high-performance big cores and 6 low-power small cores. Unfortunately ...
ieeeComputerSociety
Node Scaling Analysis for Power-Aware Real-Time Tasks Scheduling Chinese (0816)
Multi-core processors achieve a trade-off between the performance and the power consumption by using Dynamic Voltage Scaling (DVS) techniques.
ieeeComputerSociety
IlluminatedFocus (SIGGRAPH ASIA Etech 2019, IEEE VR 2020, IEEE TVCG 2020)
Tatsuyuki Ueda, Daisuke Iwai, Takefumi Hiraki, and Kosuke Sato, "IlluminatedFocus: Vision Augmentation using Spatial Defocusing via Focal Sweep ...
SENSlab
Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors (0318) Chinese
The risk of code reverse-engineering is particularly acute for embedded processors which often have limited available resources to protect program information.
ieeeComputerSociety
Arb: Efficient Arbitrary-Precision 2 Midpoint-Radius Interval Arithmetic Spanish (0817)
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball arithmetic. It supports real and complex ...
ieeeComputerSociety
Configurable XOR Hash Functions for Banked Scratchpad Memories in GPUs (0716 Chinese)
Scratchpad memories in GPU architectures are employed as software-controlled caches to increase the effective GPU memory bandwidth. Through the use of ...
ieeeComputerSociety
Gestión de Potencia Escalable para sistemas en chip con aplicaciones maleables (Spanish) 1116
Abstract—We present a scalable Dynamic Power Management (DPM) schem e where malleable applications may change their degree of parallelism at run time ...
ieeeComputerSociety
Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manicure...0117 Chinese
Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP ...
ieeeComputerSociety
Association for Computing Machinery (ACM) 2019 Conference on Computing and Sustainable Societies.
The second annual ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS 2019) being held at Accra, Ghana, from July 3 – 5, 2019.
Ashesi
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics 0217 Spanish
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Revisiting Vulnerability Analysis in Modern Microprocessors
The notion of Architectural Vulnerability Factor (AVF) has been extensively used to evaluate various aspects of design robustness. While AVF has been a very ...
ieeeComputerSociety
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation Spanish (0118)
Although data confidentiality is the primary security objective in additive encrypted computation applications, such as the aggregation of encrypted votes in ...
ieeeComputerSociety
Graph Similarity and its Applications to Hardware Security
Hardware reverse engineering is a powerful and universal tool for both security engineers and adversaries. From a defensive perspective, it allows for detection ...
ieeeComputerSociety
CppCon 2016: Matt P. Dziubinski “Computer Architecture, C++, and High Performance"
http://CppCon.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: https://github.com/cppcon/cppcon2016 — With the ...
CppCon
Progressive Congestion Management Based on Packet Marking and Validation Techniques
Congestion management in multistage interconnection networks is a serious problem not completely solved. In order to avoid the degradation of network ...
ieeeComputerSociety
What are Intelligent Transportation Systems (ITS)?
What are Intelligent Transportation Systems (ITS)? ITS involves the application of advanced and emerging technologies (computers, electronic sensors and ...
MinistryofTranBC
Natural Language Processing: Crash Course AI #7
For more information go to https://curiositystream.com/crashcourse So far in this series, we've mostly focused on how AI can interpret images, but one of the most ...
CrashCourse
Utilization Aware Power Management in Reliable and Aggressive Chip Multi Processors - March Chinese
With increasing transistor density on a single chip, processor design in the nanoscale era is hitting power and frequency walls. Due to these challenges, ...
ieeeComputerSociety
How to use the Encyclopaedia of Forms & Precedents
This is for students of Temasek Polytechnic who have access to the Library website http://spark.tp.edu.sg.
Benjamin Ang
Bubble Budgeting: Throughput Optimization for Dynamic Workloads by Exploiting Dark Cores...(Chinese)
All the cores of a many-core chip cannot be active at the same time, due to reasons like low CPU utilization in server systems and limited power budget in dark ...
ieeeComputerSociety
Deadlock Verification of Cache Coherence Protocols and Communication Fabrics
Cache coherence plays a major role in manycore systems. The verification of deadlocks is a challenge in particular, because deadlock freedom is an emerging ...
ieeeComputerSociety
Enhancing Energy Efficiency of Multimedia Applications in Heterogeneous Mobile...Spanish (1117)
Abstract—Recent smart devices have adopted heterogeneous multi-core processors which have high-performance big cores and 6 low-power small cores.
ieeeComputerSociety
Parallel Reproducible Summation
Reproducibility, i.e. getting bitwise identical floating point results from multiple runs of the same program, is a property that many users depend on either for ...
ieeeComputerSociety
Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manicure...0117 Spanish
Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP ...
ieeeComputerSociety
Sustainable High-Performance Computing | Ozalp Babaoglu | Talks at Google
As technological progress brings us ever closer to achieving exaFLOP executions in High-Performance Computing (HPC) systems, new challenges emerge for ...
Talks at Google
Facets and realities of cyber security threats | Alexandru Catalin Cosoi | TEDxBucharest
Alexandru Cosoi helps us look at the past, present and future of computers and the Internet of Things. In his world, good hackers help companies by showing ...
TEDx Talks
Linear Branch Entropy: Characterizing and Optimizing Branch Behavior...0317 Spanish
In this paper, we propose linear branch entropy, a new metric for characterizing branch behavior. Linear branch entropy is independent of the configuration of a ...
ieeeComputerSociety
SPACE: Semi-Partitioned CachE for Energy Efficient, Hard Real-Time Systems Spanish 0417
Abstract—Multi-core processors are increasingly popular because they yield higher performance, but they also present new challenges for hard real-time ...
ieeeComputerSociety