Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
CEASER: Mitigating conflict-based cache attacks via encrypted-address and remap**
MK Qureshi - 2018 51st Annual IEEE/ACM International …, 2018 - ieeexplore.ieee.org
Modern processors share the last-level cache between all the cores to efficiently utilize the
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …
Recurrent pixel embedding for instance grou**
We introduce a differentiable, end-to-end trainable framework for solving pixel-level
grou** problems such as instance segmentation consisting of two novel components …
grou** problems such as instance segmentation consisting of two novel components …
CoRAM: an in-fabric memory architecture for FPGA-based computing
FPGAs have been used in many applications to achieve orders-of-magnitude improvement
in absolute performance and energy efficiency relative to conventional microprocessors …
in absolute performance and energy efficiency relative to conventional microprocessors …
Implementing signatures for transactional memory
Transactional Memory (TM) systems must track the read and write sets--items read and
written during a transaction--to detect conflicts among concurrent trans-actions. Several TMs …
written during a transaction--to detect conflicts among concurrent trans-actions. Several TMs …
Talus: A simple way to remove cliffs in cache performance
Caches often suffer from performance cliffs: minor changes in program behavior or available
cache space cause large changes in miss rate. Cliffs hurt performance and complicate …
cache space cause large changes in miss rate. Cliffs hurt performance and complicate …
Semantic classification and hash code accelerated detection of design changes in BIM models
As the design process of a building or infrastructure is complex with iterative steps and
multidisciplinary collaboration, design changes are inevitable and efficient change detection …
multidisciplinary collaboration, design changes are inevitable and efficient change detection …
A case for richer cross-layer abstractions: Bridging the semantic gap with expressive memory
This paper makes a case for a new cross-layer interface, Expressive Memory (XMem), to
communicate higher-level program semantics from the application to the system software …
communicate higher-level program semantics from the application to the system software …
Joint embedding of meta-path and meta-graph for heterogeneous information networks
Meta-graph is currently the most powerful tool for similarity search on heterogeneous
information networks, where a meta-graph is a composition of meta-paths that captures the …
information networks, where a meta-graph is a composition of meta-paths that captures the …
Logic-base interconnect design for near memory computing in the smart memory cube
Hybrid memory cube (HMC) has promised to improve bandwidth, power consumption, and
density for the next-generation main memory systems. In addition, 3-D integration gives a …
density for the next-generation main memory systems. In addition, 3-D integration gives a …
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect
conflicts amongst concurrently running transactions in transactional memory systems (eg …
conflicts amongst concurrently running transactions in transactional memory systems (eg …