|
|
|
Jinnan Wang, Weiqin Tong and Xiaoli Zhi
Convolutional neural networks (CNNs) have made impressive achievements in image classification and object detection. For hardware with limited resources, it is not easy to achieve CNN inference with a large number of parameters without external storage. ...
ver más
|
|
|
|
|
|
Argyrios Sideris, Theodora Sanida and Minas Dasygenis
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit...
ver más
|
|
|
|
|
|
Arash Khajooei, Mohammad (Behdad) Jamshidi and Shahriar B. Shokouhi
Although the Metaverse is becoming a popular technology in many aspects of our lives, there are some drawbacks to its implementation on clouds, including long latency, security concerns, and centralized infrastructures. Therefore, designing scalable Meta...
ver más
|
|
|
|
|
|
Sunkari Pradeep, Yogesh Kumar Sharma, Chaman Verma, Gutha Sreeram and Panugati Hanumantha Rao
Modern computers? network interface cards (NICs) are undergoing changes in order to handle greater data rates and assist with scaling problems caused by general-purpose CPU technology. The inclusion of programmable accelerators to the NIC?s data channel ...
ver más
|
|
|
|
|
|
Afolabi Ige, Linhao Yang, Hang Yang, Jennifer Hasler and Cong Hao
The design of analog computing systems requires significant human resources and domain expertise due to the lack of automation tools to enable these highly energy-efficient, high-performance computing nodes. This work presents the first automated tool fl...
ver más
|
|
|