CEASER: Mitigating conflict-based cache attacks via encrypted-address and remap**

MK Qureshi - 2018 51st Annual IEEE/ACM International …, 2018 - ieeexplore.ieee.org
Modern processors share the last-level cache between all the cores to efficiently utilize the
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …

Recurrent pixel embedding for instance grou**

S Kong, CC Fowlkes - … of the IEEE conference on computer …, 2018 - openaccess.thecvf.com
We introduce a differentiable, end-to-end trainable framework for solving pixel-level
grou** problems such as instance segmentation consisting of two novel components …

CoRAM: an in-fabric memory architecture for FPGA-based computing

ES Chung, JC Hoe, K Mai - Proceedings of the 19th ACM/SIGDA …, 2011 - dl.acm.org
FPGAs have been used in many applications to achieve orders-of-magnitude improvement
in absolute performance and energy efficiency relative to conventional microprocessors …

Implementing signatures for transactional memory

D Sanchez, L Yen, MD Hill… - 40th Annual IEEE/ACM …, 2007 - ieeexplore.ieee.org
Transactional Memory (TM) systems must track the read and write sets--items read and
written during a transaction--to detect conflicts among concurrent trans-actions. Several TMs …

Talus: A simple way to remove cliffs in cache performance

N Beckmann, D Sanchez - 2015 IEEE 21st International …, 2015 - ieeexplore.ieee.org
Caches often suffer from performance cliffs: minor changes in program behavior or available
cache space cause large changes in miss rate. Cliffs hurt performance and complicate …

Semantic classification and hash code accelerated detection of design changes in BIM models

JR Lin, YC Zhou - Automation in Construction, 2020 - Elsevier
As the design process of a building or infrastructure is complex with iterative steps and
multidisciplinary collaboration, design changes are inevitable and efficient change detection …

A case for richer cross-layer abstractions: Bridging the semantic gap with expressive memory

N Vijaykumar, A Jain, D Majumdar… - 2018 ACM/IEEE 45th …, 2018 - ieeexplore.ieee.org
This paper makes a case for a new cross-layer interface, Expressive Memory (XMem), to
communicate higher-level program semantics from the application to the system software …

Joint embedding of meta-path and meta-graph for heterogeneous information networks

L Sun, L He, Z Huang, B Cao, C **a… - … conference on big …, 2018 - ieeexplore.ieee.org
Meta-graph is currently the most powerful tool for similarity search on heterogeneous
information networks, where a meta-graph is a composition of meta-paths that captures the …

Logic-base interconnect design for near memory computing in the smart memory cube

E Azarkhish, C Pfister, D Rossi, I Loi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Hybrid memory cube (HMC) has promised to improve bandwidth, power consumption, and
density for the next-generation main memory systems. In addition, 3-D integration gives a …

Notary: Hardware techniques to enhance signatures

L Yen, SC Draper, MD Hill - 2008 41st IEEE/ACM International …, 2008 - ieeexplore.ieee.org
Hardware signatures have been recently proposed as an efficient mechanism to detect
conflicts amongst concurrently running transactions in transactional memory systems (eg …