


default search action
CF 2021: Virtual Event, Italy
- Maurizio Palesi, Antonino Tumeo, Georgios I. Goumas, Carmen G. Almudéver:
CF '21: Computing Frontiers Conference, Virtual Event, Italy, May 11-13, 2021. ACM 2021, ISBN 978-1-4503-8404-9
Keynote abstracts
- Anne Y. Matsuura:
Quantum computing: a scalable, systems approach. 1 - Christina Delimitrou:
Leveraging ML to handle the increasing complexity of the cloud. 2
Computer architecture
- Francesco Daghero
, Chen Xie, Daniele Jahier Pagliari
, Alessio Burrello
, Marco Castellano, Luca Gandolfi, Andrea Calimera, Enrico Macii, Massimo Poncino:
Ultra-compact binary neural networks for human activity recognition on RISC-V processors. 3-11 - Alexander Dörflinger, Mark Albers, Benedikt Kleinbeck, Yejun Guan, Harald Michalik, Raphael Klink, Christopher Blochwitz, Anouar Nechi
, Mladen Berekovic
:
A comparative survey of open-source application-class RISC-V processor implementations. 12-20 - Tareq A. Alawneh
, Raimund Kirner
, Catherine Menon
:
Dynamic row activation mechanism for multi-core systems. 21-29
Edge computing
- Chendi Zhou, Hao Tian, Hong Zhang, Jin Zhang, Mianxiong Dong, Juncheng Jia:
TEA-fed: time-efficient asynchronous federated learning for edge computing. 30-37 - Na Lin
, Qi Zhao, Liang Zhao
:
Intelligent UAV-aided controller placement scheme for software-defined vehicular networks. 38-44 - Pirah Noor Soomro, Mustafa Abduljabbar
, Jerónimo Castrillón, Miquel Pericàs:
An online guided tuning approach to run CNN pipelines on edge devices. 45-53 - Halima Bouzidi
, Hamza Ouarnoughi
, Smaïl Niar, Abdessamad Ait El Cadi
:
Performance prediction for convolutional neural networks on edge GPUs. 54-62
Modeling, decision making and optimization
- Ailing Yu, Yujuan Tan, Congcong Xu, Zhulin Ma, Duo Liu, Xianzhang Chen
:
DFShards: effective construction of MRCs online for non-stack algorithms. 63-72 - Emmanouil Maroudas, Spyros Lalis, Nikolaos Bellas, Christos D. Antonopoulos:
Exploring the potential of context-aware dynamic CPU undervolting. 73-82 - Oceane Bel, Joosep Pata, Jean-Roch Vlimant, Nathan R. Tallent
, Justas Balcas, Maria Spiropulu:
Diolkos: improving ethernet throughput through dynamic port selection. 83-92 - Pedro Pinto
, João M. P. Cardoso
:
A methodology and framework for software memoization of functions. 93-101 - Patrick Lavin
, Jeffrey Young
, Richard W. Vuduc, Jonathan Beard:
Online model swapping for architectural simulation. 102-112
Novel computing paradigms
- Siddhartha Balakrishna Rai, Anand Sivasubramaniam, Adithya Kumar, Prasanna Venkatesh Rengasamy, Vijaykrishnan Narayanan
, Ameen Akel, Sean Eilert:
Design space for scaling-in general purpose computing within the DDR DRAM hierarchy for map-reduce workloads. 113-123 - Twisha Titirsha, Shihao Song, Adarsha Balaji, Anup Das
:
On the role of system software in energy management of neuromorphic computing. 124-132 - Elijah Pelofske, Georg Hahn, Hristo N. Djidjev:
Reducing quantum annealing biases for solving the graph partitioning problem. 133-139 - Christof Teuscher:
A golden age for computing frontiers, a dark age for computing education? 140-143 - Santiago Rodrigo, Medina Bandic, Sergi Abadal, Hans van Someren, Eduard Alarcón, Carmen G. Almudéver:
Scaling of multi-core quantum architectures: a communications-aware structured gap analysis. 144-151
Dependability
- Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Near real-time intrusion alert aggregation using concept-based learning. 152-160 - Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. 161-168 - Boyu Li, Guanquan Xu, Bin Wu, Yuhan Dong:
An efficient fault tolerant cloud market mechanism for profit maximization. 169-177
Special session on european projects
- Marco Aldinucci
, Giovanni Agosta, Antonio Andreini
, Claudio Agostino Ardagna
, Andrea Bartolini, Alessandro Cilardo, Biagio Cosenza
, Marco Danelutto, Roberto Esposito
, William Fornaciari
, Roberto Giorgi, Davide Lengani, Raffaele Montella, Mauro Olivieri, Sergio Saponara
, Daniele Simoni, Massimo Torquati:
The Italian research on HPC key technologies across EuroHPC. 178-184 - Aleksandr Ometov
, Olga Chukhno, Nadezhda Chukhno
, Jari Nurmi
, Elena Simona Lohan
:
When wearable technology meets computing in future networks: a road ahead. 185-190 - Joshua Alexander Harrison Klein, Alexandre Levisse, Giovanni Ansaloni, David Atienza, Marina Zapater, Martino Dazzi, Geethan Karunaratne, Irem Boybat, Abu Sebastian
, Davide Rossi, Francesco Conti, Elana Pereira de Santana, Peter Haring Bolívar, Mohamed Saeed, Renato Negra, Zhenxing Wang, Kun-Ta Wang, Max Christian Lemme, Akshay Jain, Robert Guirado, Hamidreza Taghvaee
, Sergi Abadal:
Architecting more than Moore: wireless plasticity for massive heterogeneous computer architectures (WiPLASH). 191-193 - Poona Bahrebar, Leon Denis
, Maxim Bonnaerens, Kristof Coddens, Joni Dambre
, Wouter Favoreel, Illia Khvastunov, Adrian Munteanu, Hung Nguyen-Duc, Stefan Schulte, Dirk Stroobandt, Ramses Valvekens, Nick Van den Broeck, Geert Verbruggen:
cREAtIve: reconfigurable embedded artificial intelligence. 194-199 - Antony Chazapis
, Jean-Thomas Acquaviva, Angelos Bilas
, Georgios Gardikis, Christos Kozanitis, Stelios Louloudakis, Huy-Nam Nguyen, Christian Pinto, Arno Scharl, Dimitrios Soudris
:
EVOLVE: HPC and cloud enhanced testbed for extracting value from large-scale diverse data. 200-205 - Ian Marsh, Nicolae Paladi, Henrik Abrahamsson, Jonas Gustafsson, Johan Sjöberg, Andreas Johnsson, Pontus Sköldström, Jim Dowling, Paolo Monti, Melina Vruna, Mohsen Amiribesheli:
Evolving 5G: ANIARA, an edge-cloud perspective. 206-207
Special session on big data analytics
- Ananth Kalyanaraman:
Scalable topological data analysis for life science applications. 208 - David A. Bader:
Interactive data science at scale. 210 - J. C. Smart:
AvesTerra: a framework for global-scale knowledge representation and analytic interoperability. 211 - Abdurrahman Yasar, Kasimir Gabert, Ümit V. Çatalyürek:
Parallel graph algorithms by blocks: from I/O to algorithms. 212
Malicious software and hardware in internet of things (MAL-IoT '21)
- Alexander Hepp, Georg Sigl:
Tapeout of a RISC-V crypto chip with hardware trojans: a case-study on trojan design and pre-silicon detectability. 213-220 - Yassine Mekdad
, Giuseppe Bernieri, Mauro Conti
, Abdeslam El Fergougui
:
A threat model method for ICS malware: the TRISIS case. 221-228 - Osnat Keren, Ilia Polian:
On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis. 229-237 - Dirmanto Jap, Yoo-Seung Won, Shivam Bhasin:
Fault injection attacks on SoftMax function in deep neural networks. 238-240

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.