default search action
CF 2021: Virtual Event, Italy
- Maurizio Palesi, Antonino Tumeo, Georgios I. Goumas, Carmen G. Almudéver:
CF '21: Computing Frontiers Conference, Virtual Event, Italy, May 11-13, 2021. ACM 2021, ISBN 978-1-4503-8404-9
Keynote abstracts
- Anne Y. Matsuura:
Quantum computing: a scalable, systems approach. 1 - Christina Delimitrou:
Leveraging ML to handle the increasing complexity of the cloud. 2
Computer architecture
- Francesco Daghero, Chen Xie, Daniele Jahier Pagliari, Alessio Burrello, Marco Castellano, Luca Gandolfi, Andrea Calimera, Enrico Macii, Massimo Poncino:
Ultra-compact binary neural networks for human activity recognition on RISC-V processors. 3-11 - Alexander Dörflinger, Mark Albers, Benedikt Kleinbeck, Yejun Guan, Harald Michalik, Raphael Klink, Christopher Blochwitz, Anouar Nechi, Mladen Berekovic:
A comparative survey of open-source application-class RISC-V processor implementations. 12-20 - Tareq A. Alawneh, Raimund Kirner, Catherine Menon:
Dynamic row activation mechanism for multi-core systems. 21-29
Edge computing
- Chendi Zhou, Hao Tian, Hong Zhang, Jin Zhang, Mianxiong Dong, Juncheng Jia:
TEA-fed: time-efficient asynchronous federated learning for edge computing. 30-37 - Na Lin, Qi Zhao, Liang Zhao:
Intelligent UAV-aided controller placement scheme for software-defined vehicular networks. 38-44 - Pirah Noor Soomro, Mustafa Abduljabbar, Jerónimo Castrillón, Miquel Pericàs:
An online guided tuning approach to run CNN pipelines on edge devices. 45-53 - Halima Bouzidi, Hamza Ouarnoughi, Smaïl Niar, Abdessamad Ait El Cadi:
Performance prediction for convolutional neural networks on edge GPUs. 54-62
Modeling, decision making and optimization
- Ailing Yu, Yujuan Tan, Congcong Xu, Zhulin Ma, Duo Liu, Xianzhang Chen:
DFShards: effective construction of MRCs online for non-stack algorithms. 63-72 - Emmanouil Maroudas, Spyros Lalis, Nikolaos Bellas, Christos D. Antonopoulos:
Exploring the potential of context-aware dynamic CPU undervolting. 73-82 - Oceane Bel, Joosep Pata, Jean-Roch Vlimant, Nathan R. Tallent, Justas Balcas, Maria Spiropulu:
Diolkos: improving ethernet throughput through dynamic port selection. 83-92 - Pedro Pinto, João M. P. Cardoso:
A methodology and framework for software memoization of functions. 93-101 - Patrick Lavin, Jeffrey Young, Richard W. Vuduc, Jonathan Beard:
Online model swapping for architectural simulation. 102-112
Novel computing paradigms
- Siddhartha Balakrishna Rai, Anand Sivasubramaniam, Adithya Kumar, Prasanna Venkatesh Rengasamy, Vijaykrishnan Narayanan, Ameen Akel, Sean Eilert:
Design space for scaling-in general purpose computing within the DDR DRAM hierarchy for map-reduce workloads. 113-123 - Twisha Titirsha, Shihao Song, Adarsha Balaji, Anup Das:
On the role of system software in energy management of neuromorphic computing. 124-132 - Elijah Pelofske, Georg Hahn, Hristo N. Djidjev:
Reducing quantum annealing biases for solving the graph partitioning problem. 133-139 - Christof Teuscher:
A golden age for computing frontiers, a dark age for computing education? 140-143 - Santiago Rodrigo, Medina Bandic, Sergi Abadal, Hans van Someren, Eduard Alarcón, Carmen G. Almudéver:
Scaling of multi-core quantum architectures: a communications-aware structured gap analysis. 144-151
Dependability
- Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Near real-time intrusion alert aggregation using concept-based learning. 152-160 - Yuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng:
ShuffleFL: gradient-preserving federated learning using trusted execution environment. 161-168 - Boyu Li, Guanquan Xu, Bin Wu, Yuhan Dong:
An efficient fault tolerant cloud market mechanism for profit maximization. 169-177
Special session on european projects
- Marco Aldinucci, Giovanni Agosta, Antonio Andreini, Claudio Agostino Ardagna, Andrea Bartolini, Alessandro Cilardo, Biagio Cosenza, Marco Danelutto, Roberto Esposito, William Fornaciari, Roberto Giorgi, Davide Lengani, Raffaele Montella, Mauro Olivieri, Sergio Saponara, Daniele Simoni, Massimo Torquati:
The Italian research on HPC key technologies across EuroHPC. 178-184 - Aleksandr Ometov, Olga Chukhno, Nadezhda Chukhno, Jari Nurmi, Elena Simona Lohan:
When wearable technology meets computing in future networks: a road ahead. 185-190 - Joshua Klein, Alexandre Levisse, Giovanni Ansaloni, David Atienza, Marina Zapater, Martino Dazzi, Geethan Karunaratne, Irem Boybat, Abu Sebastian, Davide Rossi, Francesco Conti, Elana Pereira de Santana, Peter Haring Bolívar, Mohamed Saeed, Renato Negra, Zhenxing Wang, Kun-Ta Wang, Max Christian Lemme, Akshay Jain, Robert Guirado, Hamidreza Taghvaee, Sergi Abadal:
Architecting more than Moore: wireless plasticity for massive heterogeneous computer architectures (WiPLASH). 191-193 - Poona Bahrebar, Leon Denis, Maxim Bonnaerens, Kristof Coddens, Joni Dambre, Wouter Favoreel, Illia Khvastunov, Adrian Munteanu, Hung Nguyen-Duc, Stefan Schulte, Dirk Stroobandt, Ramses Valvekens, Nick Van den Broeck, Geert Verbruggen:
cREAtIve: reconfigurable embedded artificial intelligence. 194-199 - Antony Chazapis, Jean-Thomas Acquaviva, Angelos Bilas, Georgios Gardikis, Christos Kozanitis, Stelios Louloudakis, Huy-Nam Nguyen, Christian Pinto, Arno Scharl, Dimitrios Soudris:
EVOLVE: HPC and cloud enhanced testbed for extracting value from large-scale diverse data. 200-205 - Ian Marsh, Nicolae Paladi, Henrik Abrahamsson, Jonas Gustafsson, Johan Sjöberg, Andreas Johnsson, Pontus Sköldström, Jim Dowling, Paolo Monti, Melina Vruna, Mohsen Amiribesheli:
Evolving 5G: ANIARA, an edge-cloud perspective. 206-207
Special session on big data analytics
- Ananth Kalyanaraman:
Scalable topological data analysis for life science applications. 208 - David A. Bader:
Interactive data science at scale. 210 - J. C. Smart:
AvesTerra: a framework for global-scale knowledge representation and analytic interoperability. 211 - Abdurrahman Yasar, Kasimir Gabert, Ümit V. Çatalyürek:
Parallel graph algorithms by blocks: from I/O to algorithms. 212
Malicious software and hardware in internet of things (MAL-IoT '21)
- Alexander Hepp, Georg Sigl:
Tapeout of a RISC-V crypto chip with hardware trojans: a case-study on trojan design and pre-silicon detectability. 213-220 - Yassine Mekdad, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui:
A threat model method for ICS malware: the TRISIS case. 221-228 - Osnat Keren, Ilia Polian:
On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysis. 229-237 - Dirmanto Jap, Yoo-Seung Won, Shivam Bhasin:
Fault injection attacks on SoftMax function in deep neural networks. 238-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.