Stop the war!
Остановите войну!
for scientists:
default search action
IEEE Transactions on Computers, Volume 73
Volume 73, Number 1, January 2024
- Avinash Karanth:
Editorial: EiC Farewell and Introduction of new EiC. 1-2 - Dezhong Yao, Wanning Pan, Yutong Dai, Yao Wan, Xiaofeng Ding, Chen Yu, Hai Jin, Zheng Xu, Lichao Sun:
FedGKD: Toward Heterogeneous Federated Learning via Global Knowledge Distillation. 3-17 - Zheng Wei, Xingjun Zhang, Zeyu Ji, Jingbo Li, Jia Wei:
Revisit and Benchmarking of Automated Quantization Toward Fair Comparison. 18-29 - Zhaoyan Shen, Qingxiang Tang, Tianren Zhou, Yuhao Zhang, Zhiping Jia, Dongxiao Yu, Zhiyong Zhang, Bingzhe Li:
ASHL: An Adaptive Multi-Stage Distributed Deep Learning Training Scheme for Heterogeneous Environments. 30-43 - Mingyu Wu, Zhe Li, Haibo Chen, Binyu Zang, Shaojun Wang, Lei Yu, Sanhong Li, Haitao Song:
Toward an SGX-Friendly Java Runtime. 44-57 - Ju Jia, Siqi Ma, Lina Wang, Yang Liu, Robert H. Deng:
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services. 58-72 - Yucheng Zhang, Hong Jiang, Chunzhi Wang, Wei Huang, Meng Chen, Yongxuan Zhang, Le Zhang:
Applying Delta Compression to Packed Datasets for Efficient Data Reduction. 73-85 - Andrey Kim, Maxim Deryabin, Jieun Eom, Rakyong Choi, Yongwoo Lee, Whan Ghang, Donghoon Yoo:
General Bootstrapping Approach for RLWE-Based Homomorphic Encryption. 86-96 - Wenbo Guo, Shuguo Li:
Split-Radix Based Compact Hardware Architecture for CRYSTALS-Kyber. 97-108 - Chuanwen Luo, Jian Zhang, Xiaolu Cheng, Yi Hong, Zhibo Chen, Xiaoshuang Xing:
Computation Off-Loading in Resource-Constrained Edge Computing Systems Based on Deep Reinforcement Learning. 109-122 - Zhanhui Shi, Jie Xiao, Weidong Zhu, Jianhui Jiang:
A Reliability-Critical Path Identifying Method With Local and Global Adjacency Probability Matrix in Combinational Circuits. 123-137 - Lucas Morais, Carlos Álvarez, Daniel Jiménez-González, Juan Miguel De Haro Ruiz, Guido Araujo, Michael Frank, Alfredo Goldman, Xavier Martorell:
Enabling HW-Based Task Scheduling in Large Multicore Architectures. 138-151 - Wenhao Sun, Zhiwei Zou, Deng Liu, Wendi Sun, Song Chen, Yi Kang:
Bit-Balance: Model-Hardware Codesign for Accelerating NNs by Exploiting Bit-Level Sparsity. 152-163 - Yang Zhou, Fang Wang, Zhan Shi, Dan Feng:
An Efficient Deep Reinforcement Learning-Based Automatic Cache Replacement Policy in Cloud Block Storage Systems. 164-177 - Jiguo Yu, Biwei Yan, Huayi Qi, Shengling Wang, Wei Cheng:
An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT. 178-191 - Jiangjiang Zhang, Zhenhu Ning, Muhammad Waqas, Hisham Alasmary, Shanshan Tu, Sheng Chen:
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization. 192-205 - Miao Cai, Xuzhen Jiang, Junru Shen, Baoliu Ye:
SplitDB: Closing the Performance Gap for LSM-Tree-Based Key-Value Stores. 206-220 - Benjamin R. Willis, Aviral Shrivastava, Joshua Mack, Shail Dave, Chaitali Chakrabarti, John S. Brunhaver:
Cyclebite: Extracting Task Graphs From Unstructured Compute-Programs. 221-234 - Yue Zeng, Zhihao Qu, Song Guo, Baoliu Ye, Jie Zhang, Jing Li, Bin Tang:
SafeDRL: Dynamic Microservice Provisioning With Reliability and Latency Guarantees in Edge Environments. 235-248 - Myeongjae Jang, Jinkwon Kim, Haejin Nam, Soontae Kim:
Zero and Narrow-Width Value-Aware Compression for Quantized Convolutional Neural Networks. 249-262 - Thomas Benz, Michael Rogenmoser, Paul Scheffler, Samuel Riedel, Alessandro Ottaviano, Andreas Kurth, Torsten Hoefler, Luca Benini:
A High-Performance, Energy-Efficient Modular DMA Engine Architecture. 263-277 - Jin Yang, Zhenkun Yang, Jeremy Casas, Sandip Ray:
Correct-by-Construction Design of Custom Accelerator Microarchitectures. 278-291 - David M. Harris, James E. Stine, Milos D. Ercegovac, Alberto Nannarelli, Katherine Parry, Cedar Turek:
Unified Digit Selection for Radix-4 Recurrence Division and Square Root. 292-300
Volume 73, Number 2, February 2024
- Hao Jiang, Jintao Yang, Guang Hua, Lixia Li, Ying Wang, Shenghui Tu, Song Xia:
FAWA: Fast Adversarial Watermark Attack. 301-313 - Juzhen Wang, Yiqi Hu, Yiren Qi, Ziwen Peng, Changjia Zhou:
Mitigating Adversarial Attacks Based on Denoising & Reconstruction With Finance Authentication System Case Study. 314-326 - Tianze Zhang, Xuhong Miao, Yibin Li, Lei Jia, Yinghao Zhuang:
AUV Surfacing Control With Adversarial Attack Against DLaaS Framework. 327-339 - Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng, Naixue Xiong:
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. 340-352 - Hyeonuk Kim, Youngbeom Jung, Lee-Sup Kim:
ADC-Free ReRAM-Based In-Situ Accelerator for Energy-Efficient Binary Neural Networks. 353-365 - Hongyi Li, Songchen Ma, Taoyi Wang, Weihao Zhang, Guanrui Wang, Chenhang Song, Huanyu Qu, Junfeng Lin, Cheng Ma, Jing Pei, Rong Zhao:
HASP: Hierarchical Asynchronous Parallelism for Multi-NN Tasks. 366-379 - Kota Asanuma, Hiroshi Yamada:
DBMS-Assisted Live Migration of Virtual Machines. 380-393 - Zaobo He, Zhipeng Cai:
Trading Aggregate Statistics Over Private Internet of Things Data. 394-407 - Wanqing Jie, Wangjie Qiu, Arthur Sandor Voundi Koe, Jianhong Li, Yin Wang, Yaqi Wu, Jin Li:
A Secure and Flexible Blockchain-Based Offline Payment Protocol. 408-421 - Mingyang Song, Zhongyun Hua, Yifeng Zheng, Hejiao Huang, Xiaohua Jia:
LSDedup: Layered Secure Deduplication for Cloud Storage. 422-435 - Rajat Sadhukhan, Sayandeep Saha, Sudipta Paria, Swarup Bhunia, Debdeep Mukhopadhyay:
VALIANT: An EDA Flow for Side-Channel Leakage Evaluation and Tailored Protection. 436-450 - Giuliano Casale, Manuel Roveri:
Scheduling Inputs in Early Exit Neural Networks. 451-465 - Zichuan Xu, Lin Wang, Weifa Liang, Qiufen Xia, Wenzheng Xu, Pan Zhou, Omer F. Rana:
Age-Aware Data Selection and Aggregator Placement for Timely Federated Continual Learning in Mobile Edge Computing. 466-480 - Guorui Xie, Qing Li, Zhenning Shi, Hanbin Fang, Shengpeng Ji, Yong Jiang, Zhenhui Yuan, Lianbo Ma, Mingwei Xu:
Generating Neural Networks for Diverse Networking Classification Tasks via Hardware-Aware Neural Architecture Search. 481-494 - Trevor E. Pogue, Nicola Nicolici:
Fast Inner-Product Algorithms and Architectures for Deep Neural Network Accelerators. 495-509 - Hai Jin, Zhanyang Zhu, Ligang He, Yuhao Li, Yusheng Hua, Xuanhua Shi:
MMDataLoader: Reusing Preprocessed Data Among Concurrent Model Training Tasks. 510-522 - Yuxing Chen, Xinrui Wang, Suwen Song, Lang Feng, Zhongfeng Wang:
RISC-V Custom Instructions of Elementary Functions for IoT Endpoint Devices. 523-535 - Abrar A. Ibrahim, Ahmed M. Y. Ibrahim, M. Watheq El-Kharashi, Mona Safar:
Adaptive SAT Modeling for Optimal Pattern Retargeting in IEEE 1687 Networks. 536-547 - Alberto Ros, Alexandra Jimborean:
Wrong-Path-Aware Entangling Instruction Prefetcher. 548-559 - Kari Hepola, Joonas Multanen, Pekka Jääskeläinen:
Energy-Efficient Exposed Datapath Architecture With a RISC-V Instruction Set Mode. 560-573 - Tianyang Yu, Bi Wu, Ke Chen, Gong Zhang, Weiqiang Liu:
Fully Learnable Hyperdimensional Computing Framework With Ultratiny Accelerator for Edge-Side Applications. 574-585 - Ruirui Zhang, Zhenzhen Xie, Dongxiao Yu, Weifa Liang, Xiuzhen Cheng:
Digital Twin-Assisted Federated Learning Service Provisioning Over Mobile Edge Networks. 586-598 - Rodion Novkin, Florian Klemme, Hussam Amrouch:
Approximation- and Quantization-Aware Training for Graph Neural Networks. 599-612 - Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. 613-620 - Shao-I Chu, Chi-Long Wu, Tzu-Heng Chien, Bing-Hong Liu, Tu N. Nguyen:
Stochastic Circuits for Computing Weighted Ratio With Applications to Multiclass Bayesian Inference Machine. 621-630
Volume 73, Number 3, March 2024
- Laizhong Cui, Ziteng Chen, Shu Yang, Ruiyu Chen, Zhong Ming:
A Secure and Decentralized DLaaS Platform for Edge Resource Scheduling Against Adversarial Attacks. 631-644 - Han Qiu, Yi Zeng, Qinkai Zheng, Shangwei Guo, Tianwei Zhang, Hewu Li:
An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks. 645-655 - Zhihan Lv, Dongliang Chen, Bin Cao, Houbing Song, Haibin Lv:
Secure Deep Learning in Defense in Deep-Learning-as-a-Service Computing Systems in Digital Twins. 656-668 - Wei Liang, Yuhui Li, Jianlong Xu, Zheng Qin, Dafang Zhang, Kuan-Ching Li:
QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS. 669-682 - Jun Feng, Laurence T. Yang, Bocheng Ren, Deqing Zou, Mianxiong Dong, Shunli Zhang:
Tensor Recurrent Neural Network With Differential Privacy. 683-693 - Wan-Ling Wu, Jen-Wei Hsieh, Hao-Yu Ku:
CDS: Coupled Data Storage to Enhance Read Performance of 3D TLC NAND Flash Memory. 694-707 - Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang:
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers. 708-721 - Mengying Zhao, Shuo Xu, Lihao Dong, Chun Jason Xue, Dongxiao Yu, Xiaojun Cai, Zhiping Jia:
Branch Predictor Design for Energy Harvesting Powered Nonvolatile Processors. 722-734 - Muhammad Hamis Haider, Hao Zhang, Seok-Bum Ko:
Decoder Reduction Approximation Scheme for Booth Multipliers. 735-746 - Chong Zhang, Songfan Li, Yihang Song, Qianhe Meng, Li Lu, Hongzi Zhu, Xin Wang:
A Lightweight and Chip-Level Reconfigurable Architecture for Next-Generation IoT End Devices. 747-763 - Da Yang, Zhenglong Cui, Hao Sheng, Rongshan Chen, Ruixuan Cong, Shuai Wang, Zhang Xiong:
An Occlusion and Noise-Aware Stereo Framework Based on Light Field Imaging for Robust Disparity Estimation. 764-777 - Jiahao Shen, Hao Sheng, Shuai Wang, Ruixuan Cong, Da Yang, Yang Zhang:
Blockchain-Based Distributed Multiagent Reinforcement Learning for Collaborative Multiobject Tracking Framework. 778-788 - Dongxiao Yu, Ruopeng Chen, Xin Li, Mengbai Xiao, Guanghui Zhang, Yao Liu:
A GPU-Enabled Real-Time Framework for Compressing and Rendering Volumetric Videos. 789-800 - Ting Wang, Xin Jiang, Qin Li, Haibin Cai:
GreedW: A Flexible and Efficient Decentralized Framework for Distributed Machine Learning. 801-814 - Hao Wang, Bo Tang, Chi Harold Liu, Shangqin Mao, Jiahong Zhou, Zipeng Dai, Yaqi Sun, Qianlong Xie, Xingxing Wang, Dong Wang:
HiBid: A Cross-Channel Constrained Bidding System With Budget Allocation by Hierarchical Offline Deep Reinforcement Learning. 815-828 - Francesco Tosoni, Nicola Dall'Ora, Enrico Fraccaroli, Sara Vinco, Franco Fummi:
Multidomain Fault Models Covering the Analog Side of a Smart or Cyber-Physical System. 829-841 - Hai Mo, Yong Wu, Honglan Jiang, Zining Ma, Fabrizio Lombardi, Jie Han, Leibo Liu:
Learning the Error Features of Approximate Multipliers for Neural Network Applications. 842-856 - Junyi Liu, Aleksandar Dragojevic, Shane T. Fleming, Antonios Katsarakis, Dario Korolija, Igor Zablotchi, Ho-Cheung Ng, Anuj Kalia, Miguel Castro:
Honeycomb: Ordered Key-Value Store Acceleration on an FPGA-Based SmartNIC. 857-871 - Yingling Mao, Xiaojun Shang, Yu Liu, Yuanyuan Yang:
Joint Virtual Network Function Placement and Flow Routing in Edge-Cloud Continuum. 872-886 - Yingxue Gao, Teng Wang, Lei Gong, Chao Wang, Yiqing Hu, Yi Yang, Zhongming Liu, Xi Li, Xuehai Zhou:
Enhancing Graph Random Walk Acceleration via Efficient Dataflow and Hybrid Memory Architecture. 887-901 - Yudi Qiu, Tao Huang, Yuxin Tang, Yanwei Liu, Yang Kong, Xulin Yu, Xiaoyang Zeng, Yibo Fan:
Gem5Tune: A Parameter Auto-Tuning Framework for Gem5 Simulator to Reduce Errors. 902-914 - Jianfeng Xu:
Research and Application of General Information Measures Based on a Unified Model. 915-927 - Chen Zhang, Qingyuan Xie, Mingyue Wang, Yu Guo, Xiaohua Jia:
Optimal Compression for Encrypted Key-Value Store in Cloud Systems. 928-941 - Liyuan Ma, Xiulong Liu, Yuhan Li, Chenyu Zhang, Gaowei Shi, Keqiu Li:
GFBE: A Generalized and Fine-Grained Blockchain Evaluation Framework. 942-955
Volume 73, Number 4, April 2024
- Guangquan Xu, Guohua Xin, Litao Jiao, Jian Liu, Shaoying Liu, Meiqi Feng, Xi Zheng:
OFEI: A Semi-Black-Box Android Adversarial Sample Attack Framework Against DLaaS. 956-969 - Ying Zhao, Jinjun Chen:
Vector-Indistinguishability: Location Dependency Based Privacy Protection for Successive Location Data. 970-979 - Fangtian Zhong, Xiuzhen Cheng, Dongxiao Yu, Bei Gong, Shuaiwen Song, Jiguo Yu:
MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors. 980-993 - Hexuan Hu, Zhen-Zhou Lin, Qiang Hu, Ye Zhang, Wei Wei, Wei Wang:
Multi-Source Information Fusion Based DLaaS for Traffic Flow Prediction. 994-1003 - Yangguang Cui, Zhixing Zhang, Nuo Wang, Liying Li, Chunwei Chang, Tongquan Wei:
User-Distribution-Aware Federated Learning for Efficient Communication and Fast Inference. 1004-1018 - Wei Song, Zihan Xue, Jinchi Han, Zhenzhen Li, Peng Liu:
Randomizing Set-Associative Caches Against Conflict-Based Cache Side-Channel Attacks. 1019-1033 - Binqi Sun, Mirco Theile, Ziyuan Qin, Daniele Bernardini, Debayan Roy, Andrea Bastoni, Marco Caccamo:
Edge Generation Scheduling for DAG Tasks Using Deep Reinforcement Learning. 1034-1047 - Jianqi Shi, Yinghao Chen, Qin Li, Yanhong Huang, Yang Yang, Mengyan Zhao:
Automated Test Cases Generator for IEC 61131-3 Structured Text Based Dynamic Symbolic Execution. 1048-1059 - Yuan Yuan, Shuzhen Chen, Dongxiao Yu, Zengrui Zhao, Yifei Zou, Lizhen Cui, Xiuzhen Cheng:
Distributed Learning for Large-Scale Models at Edge With Privacy Protection. 1060-1070 - Zhaorui Wu, Yuhui Deng, Yi Zhou, Jie Li, Shujie Pang, Xiao Qin:
FaaSBatch: Boosting Serverless Efficiency With In-Container Parallelism and Resource Multiplexing. 1071-1085 - Biwei Yan, Hongliang Zhang, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng:
FedRFQ: Prototype-Based Federated Learning With Reduced Redundancy, Minimal Failure, and Enhanced Quality. 1086-1098 - Xin Niu, Yajing Huang, Zhiwei Wang, Chen Yu, Hai Jin:
Game-Based Adaptive FLOPs and Partition Point Decision Mechanism With Latency and Energy-Efficient Tradeoff for Edge Intelligence. 1099-1113 - Shiyu Li, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang, Hongwei Li:
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution. 1114-1125 - Wenjie Huang, Zhiwei Zhao, Geyong Min, Jiajun Chen:
Distributed Multihop Task Offloading in Massive Heterogeneous IoT Systems. 1126-1137 - Yanling Wang, Xiaolin Chang, Haoran Zhu, Jianhua Wang, Yanwei Gong, Lin Li:
Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC. 1138-1151 - Yifei Zou, Shikun Shen, Mengbai Xiao, Peng Li, Dongxiao Yu, Xiuzhen Cheng:
Value of Information: A Comprehensive Metric for Client Selection in Federated Edge Learning. 1152-1164 - Zhiyong Lin, Hai Liu, Xiaowen Chu, Yiu-Wing Leung, Ivan Stojmenovic:
Constructing Connected-Dominating-Set with Maximum Lifetime in Cognitive Radio Networks. 1165-1179 - Irina Alam, Puneet Gupta:
Achieving DRAM-Like PCM by Trading Off Capacity for Latency. 1180-1189
Volume 73, Number 5, May 2024
- Jianting Zhang, Wuhui Chen, Zicong Hong, Gang Xiao, Linlin Du, Zibin Zheng:
Efficient Execution of Arbitrarily Complex Cross-Shard Contracts for Blockchain Sharding. 1190-1205 - Zülal Bingöl, Mohammed Alser, Onur Mutlu, Ozcan Ozturk, Can Alkan:
GateKeeper-GPU: Fast and Accurate Pre-Alignment Filtering in Short Read Mapping. 1206-1218 - Jie-Fang Zhang, Cheng-Hsun Lu, Zhengya Zhang:
TetriX: Flexible Architecture and Optimal Mapping for Tensorized Neural Network Processing. 1219-1232 - Chao Chen, Jinhan Xin, Zhibin Yu:
TIE: Fast Experiment-Driven ML-Based Configuration Tuning for In-Memory Data Analytics. 1233-1247 - Shiyu Li, Yitu Wang, Edward Hanson, Andrew Chang, Yang-Seok Ki, Hai Li, Yiran Chen:
NDRec: A Near-Data Processing System for Training Large-Scale Recommendation Models. 1248-1261 - Yueyao Wang, Samuel Furman, Nicolás Hardy, Margaret Ellis, Godmar Back, Yili Hong, Kirk W. Cameron:
A Detailed Historical and Statistical Analysis of the Influence of Hardware Artifacts on SPEC Integer Benchmark Performance. 1262-1274 - Cong Guo, Fengchen Xue, Jingwen Leng, Yuxian Qiu, Yue Guan, Weihao Cui, Quan Chen, Minyi Guo:
Accelerating Sparse DNNs Based on Tiled GEMM. 1275-1289 - Lin Ding, Zhengting Li, Ziyu Guan, Xinhai Wang, Zheng Wu:
Breaking the DECT Standard Cipher With Lower Time Cost. 1290-1299 - Hechuan Guo, Minghui Xu, Jiahao Zhang, Chunchi Liu, Rajiv Ranjan, Dongxiao Yu, Xiuzhen Cheng:
BFT-DSN: A Byzantine Fault-Tolerant Decentralized Storage Network. 1300-1312 - Yucong Chen, Yanshan Tian, Rui Zhou, Diego Martínez-Castro, Deke Guo, Qingguo Zhou:
NDSTRNG: Non-Deterministic Sampling-Based True Random Number Generator on SoC FPGA Systems. 1313-1326 - Haikun Liu, Xiaozhong Jin, Chencheng Ye, Xiaofei Liao, Hai Jin, Yu Zhang:
I/O Causality Based In-Line Data Deduplication for Non-Volatile Memory Enabled Storage Systems. 1327-1340 - Pouya Esmaili-Dokht, Miquel Guiot, Petar Radojkovic, Xavier Martorell, Eduard Ayguadé, Jesús Labarta, Jason Adlard, Paolo Amato, Marco Sforzin:
$\mathcal{O}(n)$O(n) Key-Value Sort With Active Compute Memory. 1341-1356 - Fuliang Li, Songlin Chen, Xingxin Jia, Chengxi Gao, Pengfei Wang, Xingwei Wang, Jiannong Cao:
Distributed Program Deployment for Resource-Aware Programmable Switches. 1357-1370 - Shihang Wang, Xingbo Wang, Zhiyuan Xu, Bingzhen Chen, Chenxi Feng, Qi Wang, Terry Tao Ye:
Optimizing CNN Computation Using RISC-V Custom Instruction Sets for Edge Platforms. 1371-1384 - Cai Deng, Xiangyu Zou, Qi Chen, Bo Tang, Wen Xia:
The Design of a Lossless Deduplication Scheme to Eliminate Fine-Grained Redundancy for JPEG Image Storage Systems. 1385-1399 - Lianbo Ma, Haidong Kang, Guo Yu, Qing Li, Qiang He:
Single-Domain Generalized Predictor for Neural Architecture Search System. 1400-1413 - Philippos Papaphilippou, Thiem Van Chu:
Efficient Deadlock Avoidance for 2-D Mesh NoCs That Use OQ or VOQ Routers. 1414-1426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.