dblp: CF 2019 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


CF 2019: Alghero, Italy

jump to- Keynotes
- Security
- Quantum computing
- Memory technologies
- Machine Learning
- Architectures
- Mobile and edge computing
- Programming systems and abstractions
- Special session on the data model convergence: Architecture
- Special session on the data model convergence: Co-design
- Malicious software and hardware in internet of things (MAL-IOT19)

- > Home > Conferences and Workshops > CF
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Francesca Palumbo, Michela Becchi, Martin Schulz, Kento Sato:
Proceedings of the 16th ACM International Conference on Computing Frontiers, CF 2019, Alghero, Italy, April 30 - May 2, 2019. ACM 2019, ISBN 978-1-4503-6685-4
Keynotes

Catherine Graves:
High performance, power efficient hardware accelerators: emerging devices, circuits and architecture co-design. 1

Danilo Pau
:
Artificial intelligent sensors at the core of cyber-physical-systems: from theory to practical applications. 2
Machine Learning

Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski:
nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. 3-13

Xuewen Cui
, Wu-chun Feng:
Iterative machine learning (IterML) for effective parameter pruning and tuning in accelerators. 16-23
Security

Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. 24-31

Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. 32-41

Muhammad Ali Siddiqi
, Christos Strydis
:
Towards realistic battery-DoS protection of implantable medical devices. 42-49

Francis B. Moreira, Daniel A. G. de Oliveira
, Philippe O. A. Navaux:
SPADA: a statistical program attack detection analysis. 50-58
Architectures

Florian Neugebauer, Ilia Polian, John P. Hayes:
On the maximum function in stochastic computing. 59-66

Swamit S. Tannu
, Poulami Das, Michael L. Lewis, Robert F. Krick, Douglas M. Carmean, Moinuddin K. Qureshi:
A case for superconducting accelerators. 67-75
Quantum computing

Elijah Pelofske, Georg Hahn, Hristo N. Djidjev
:
Solving large minimum vertex cover problems on a quantum annealer. 76-84

Jun Doi, Hitomi Takahashi, Rudy Raymond
, Takashi Imamichi, Hiroshi Horii:
Quantum computing simulator on a heterogenous HPC system. 85-93
Optimization and algorithms

Marcelino Rodriguez-Cancio, Benoît Combemale, Benoit Baudry:
Approximate loop unrolling. 94-105

Anastasiia Butko, George Michelogiannakis
, David Donofrio, John Shalf
:
TIGER: topology-aware task assignment approach using ising machines. 106-114

Shuo Ji, Yinliang Zhao, Qing Yi:
Accelerating parallel graph computing with speculation. 115-124

Kartik Lakhotia, Rajgopal Kannan, Aditya Gaur, Ajitesh Srivastava, Viktor K. Prasanna:
Parallel edge-based sampling for static and dynamic graphs. 125-134
Memory technologies

Foteini Strati
, Christina Giannoula, Dimitrios Siakavaras, Georgios I. Goumas, Nectarios Koziris:
An adaptive concurrent priority queue for NUMA architectures. 135-144

Alexandre Chabot, Ihsen Alouani
, Smaïl Niar, Réda Nouacer
:
A new memory reliability technique for multiple bit upsets mitigation. 145-152

Christos Sakalis, Mehdi Alipour, Alberto Ros
, Alexandra Jimborean
, Stefanos Kaxiras, Magnus Själander:
Ghost loads: what is the cost of invisible speculation? 153-163
Programming systems and abstractions

Matthew Sotoudeh
, Anand Venkat, Michael J. Anderson, Evangelos Georganas, Alexander Heinecke, Jason Knight:
ISA mapper: a compute and hardware agnostic deep learning compiler. 164-173

Long Chen, Wei Ye, Shikun Zhang:
Capturing source code semantics via tree-based convolution over API-enhanced AST. 174-182
Machine Learning

Yehya Nasser, Carlo Sau, Jean-Christophe Prévotet, Tiziana Fanni
, Francesca Palumbo
, Maryline Hélard, Luigi Raffo
:
NeuPow: artificial neural networks for power and behavioral modeling of arithmetic components in 45nm ASICs technology. 183-189

Xingbin Wang
, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. 190-196

Zhou Cheng, Tianmei Qi, Jixiang Wang, Yu Zhou, Zhihong Wang, Yi Guo, Junfeng Zhao:
Sentiment evaluation of forex news. 197-201

Liang Ge, Aoli Zhou, Hang Li, Junling Liu:
Spatially fine-grained air quality prediction based on DBU-LSTM. 202-205
Security

Swastika Dutta, Sayan Sinha:
Performance statistics and learning based detection of exploitative speculative attacks. 206-210

Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. 211-214
Architectures

Marcel Brand, Michael Witterauf, Frank Hannig
, Jürgen Teich:
Anytime instructions for programmable accuracy floating-point arithmetic. 215-219
Quantum Computing

Georgiy Krylov, Martin Lukac:
Quantum encoded quantum evolutionary algorithm for the design of quantum circuits. 220-225

Daniel Vert, Renaud Sirdey
, Stéphane Louise:
On the limitations of the chimera graph topology in using analog quantum computers. 226-229

Suvadip Batabyal
, Kounteya Sarkar
:
Realizing parallelism in quantum MISD architecture. 230-234
Mobile and edge computing
Memory technologies

Wang Xu, Israel Koren:
Designing a secure DRAM+NVM hybrid memory module. 251-255

Ivy Bo Peng
, Jeffrey S. Vetter, Shirley Moore
, Joydeep Rakshit, Stefano Markidis:
Analyzing the suitability of contemporary 3D-stacked PIM architectures for HPC scientific applications. 256-262
Programming systems and abstractions
Poster papers

Muhammad Ali Siddiqi
, Christos Strydis
:
IMD security vs. energy: are we tilting at windmills?: POSTER. 283-285

Zhou Cheng, Jixiang Wang, Tianmei Qi, Junfeng Zhao, Zhihong Wang, Yi Guo, Yu Zhou:
Will sentiment of forex news effect forecast of the RMB exchange rate?: POSTER. 286-288

Daniel Madroñal, Tiziana Fanni
:
Run-time performance monitoring of hardware accelerators: POSTER. 289-291

Daniele Cattaneo
, Antonio Di Bello, Michele Chiari
, Stefano Cherubin
, Giovanni Agosta:
Fixed point exploitation via compiler analyses and transformations: POSTER. 292-294

Qingchang Han, Hailong Yang, Zhongzhi Luan, Depei Qian:
Accelerating tile low-rank GEMM on sunway architecture: POSTER. 295-297

Emanuele Vitali, Davide Gadioli, Andrea Beccari, Carlo Cavazzoni, Cristina Silvano, Gianluca Palermo:
An hybrid approach to accelerate a molecular docking application for virtual screening in heterogeneous nodes: POSTER. 298-299

G. A. Gillani, André B. J. Kokkeler:
Go green radio astronomy: Approximate Computing Perspective: Opportunities and Challenges: POSTER. 300-301

Carsten Trinitis, Christina B. Class, Stefan Ullrich:
The german informatics society's new ethical guidelines: POSTER. 302-304

Krista Rizman Zalik, Borut Zalik:
Using community detection for spatial networks: POSTER. 305-306
Special session on the data model convergence: Architecture

John L. Gustafson:
Next-generation arithmetic: major performance gains with minimal disruption. 307

John D. Leidel, Frank Conlon:
Toward a graph-based dependence analysis framework for high level design verification. 308-316

Anastasiia Butko, George Michelogiannakis
, David Donofrio, John Shalf
:
Extending classical processors to support future large scale quantum accelerators. 317

Alejandro Rico:
Scaling up performance of fat nodes for HPC. 318
Special invited session on EU projects

Mario Kovac:
European processor initiative: the industrial cornerstone of EuroHPC for exascale era. 319

Francesca Palumbo
, Tiziana Fanni
, Carlo Sau, Luca Pulina
, Luigi Raffo
, Michael Masin, Evgeny Shindin
, Pablo Sanchez de Rojas, Karol Desnos, Maxime Pelcat, Alfonso Rodríguez, Eduardo Juárez
, Francesco Regazzoni
, Giuseppe Meloni, Katiuscia Zedda, Hans Myrhaug, Leszek Kaliciak
, Joost Adriaanse, Julio de Oliveira Filho, Pablo Muñoz, Antonella Toffetti:
CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments: Invited paper: CERBERO teams from UniSS, UniCA, IBM Research, TASE, INSA-Rennes, UPM, USI, Abinsula, AmbieSense, TNO, S&T, CRF. 320-325

Paolo Meloni, Daniela Loi, Paola Busia, Gianfranco Deriu, Andy D. Pimentel
, Dolly Sapra
, Todor P. Stefanov
, Svetlana Minakova, Francesco Conti, Luca Benini
, Maura Pintor
, Battista Biggio
, Bernhard Moser
, Natalia Shepeleva, Nikos Fragoulis, Ilias Theodorakopoulos
, Michael Masin, Francesca Palumbo
:
Optimization and deployment of CNNs at the edge: the ALOHA experience. 326-332

Zaid Al-Ars, Twan Basten, Ad de Beer, Marc Geilen
, Dip Goswami, Pekka Jääskeläinen
, Jirí Kadlec, Marcos Martinez de Alejandro, Francesca Palumbo
, Geran Peeren, Luigi Pomante
, Frank van der Linden, Jukka Saarinen, Tero Säntti, Carlo Sau, Maria Katiuscia Zedda:
The FitOptiVis ECSEL project: highly efficient distributed embedded image/video processing in cyber-physical systems. 333-338

Petar Radojkovic:
Towards resilient EU HPC systems: a blueprint. 339
Special session on the data model convergence: Co-design

Alex Pothen
:
Parallel algorithms through approximation: graphs, data privacy and machine learning. 340

Johannes Langguth:
PGAS for graph analytics: can one sided communications break the scalability barrier? 341

Massimo Bernaschi, Alessandro Celestini
, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Analysing the tor web with high performance graph algorithms. 342

Antonino Tumeo:
Data and model convergence: a case for software defined architectures. 343
5th workshop on design of low power embedded systems (LP-EMS19)

Geneviève Ndour, Tiago Trevisan Jost, Anca Molnos, Yves Durand, Arnaud Tisserand:
Evaluation of variable bit-width units in a RISC-V processor for approximate computing. 344-349

Matteo Antonio Scrugli, Daniela Loi, Luigi Raffo
, Paolo Meloni:
A runtime-adaptive cognitive IoT node for healthcare monitoring. 350-357

G. A. Gillani, A. Krapukhin
, André B. J. Kokkeler:
Energy-efficient approximate least squares accelerator: a case study of radio astronomy calibration processing. 358-365

Crefeda Faviola Rodrigues
, Graham D. Riley, Mikel Luján:
Exploration of task-based scheduling for convolutional neural networks accelerators under memory constraints. 366-372
Malicious software and hardware in internet of things (MAL-IOT19)

Yan Yan, Elisabeth Oswald:
Examining the practical side channel resilience of ARX-boxes. 373-379

Samuel N. Eshun
, Paolo Palmieri
:
A privacy-preserving protocol for indoor wi-fi localization. 380-385

Niccolò Izzo
, Alessandro Barenghi
, Luca Breveglieri
, Gerardo Pelosi
, Paolo Amato:
A secure and authenticated host-to-memory communication interface. 386-391

Sebastian Wallat, Nils Albartus
, Steffen Becker
, Max Hoffmann
, Maik Ender
, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. 392-397

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






