A closer look at spatiotemporal convolutions for action recognition
In this paper we discuss several forms of spatiotemporal convolutions for video analysis and
study their effects on action recognition. Our motivation stems from the observation that 2D …
study their effects on action recognition. Our motivation stems from the observation that 2D …
Caladan: Mitigating interference at microsecond timescales
The conventional wisdom is that CPU resources such as cores, caches, and memory
bandwidth must be partitioned to achieve performance isolation between tasks. Both the …
bandwidth must be partitioned to achieve performance isolation between tasks. Both the …
Fusion++: Volumetric object-level slam
We propose an online object-level SLAM system which builds a persistent and accurate 3D
graph map of arbitrary reconstructed objects. As an RGB-D camera browses a cluttered …
graph map of arbitrary reconstructed objects. As an RGB-D camera browses a cluttered …
DAWG: A defense against cache timing attacks in speculative execution processors
Software side channel attacks have become a serious concern with the recent rash of
attacks on speculative processor architectures. Most attacks that have been demonstrated …
attacks on speculative processor architectures. Most attacks that have been demonstrated …
Architectural implications of function-as-a-service computing
Serverless computing is a rapidly growing cloud application model, popularized by
Amazon's Lambda platform. Serverless cloud services provide fine-grained provisioning of …
Amazon's Lambda platform. Serverless cloud services provide fine-grained provisioning of …
A survey of techniques for cache partitioning in multicore processors
S Mittal - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
As the number of on-chip cores and memory demands of applications increase, judicious
management of cache resources has become not merely attractive but imperative. Cache …
management of cache resources has become not merely attractive but imperative. Cache …
Mi6: Secure enclaves in a speculative out-of-order processor
Recent attacks have broken process isolation by exploiting microarchitectural side channels
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
that allow indirect access to shared microarchitectural state. Enclaves strengthen the …
Edge security: Challenges and issues
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …
where data are generated. While such an architecture provides faster processing and …
Nethammer: Inducing rowhammer faults through network requests
In this paper, we present Nethammer, a remote Rowhammer attack without a single attacker-
controlled line of code on the targeted system, ie, not even JavaScript. Nethammer works on …
controlled line of code on the targeted system, ie, not even JavaScript. Nethammer works on …
KPart: A hybrid cache partitioning-sharing technique for commodity multicores
Cache partitioning is now available in commercial hardware. In theory, software can
leverage cache partitioning to use the last-level cache better and improve performance. In …
leverage cache partitioning to use the last-level cache better and improve performance. In …