CSpace

浏览/检索结果: 共6条,第1-6条 帮助

限定条件        
已选(0)清除 条数/页:   排序方式:
Accelerating Deformable Convolution Networks with Dynamic and Irregular Memory Accesses 期刊论文
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2023, 卷号: 28, 期号: 4, 页码: 23
作者:  Chu, Cheng;  Liu, Cheng;  Xu, Dawen;  Wang, Ying;  Luo, Tao;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Deformable convolution network  neural network accelerator  irregular memory access  runtime tile scheduling  
SynergyFlow: An Elastic Accelerator Architecture Supporting Batch Processing of Large-Scale Deep Neural Networks 期刊论文
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2019, 卷号: 24, 期号: 1, 页码: 27
作者:  Li, Jiajun;  Yan, Guihai;  Lu, Wenyan;  Gong, Shijun;  Jiang, Shuhao;  Wu, Jingya;  Li, Xiaowei
收藏  |  浏览/下载:70/0  |  提交时间:2019/04/03
Deep neural networks  convolutional neural networks  accelerator  architecture  resource utilization  complementary effect  
A Loss Inference Algorithm for Wireless Sensor Networks to Improve Data Reliability of Digital Ecosystems 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 卷号: 58, 期号: 6, 页码: 2126-2137
作者:  Yang, Yu;  Xu, Yongjun;  Li, Xiaowei;  Chen, Canfeng
收藏  |  浏览/下载:69/0  |  提交时间:2019/12/16
Cyber-physical ecosystems (CPEs)  data aggregation  digital ecosystems (DEs)  network performance measurement  network tomography  wireless sensor networks (WSNs)  
MicroFix: Using Timing Interpolation and Delay Sensors for Power Reduction 期刊论文
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2011, 卷号: 16, 期号: 2, 页码: 21
作者:  Yan, Guihai;  Han, Yinhe;  Liu, Hui;  Liang, Xiaoyao;  Li, Xiaowei
收藏  |  浏览/下载:65/0  |  提交时间:2019/12/16
Design  Performance  Reliability  Power reduction  fine-grained adaptability  DVFS  timing interpolation  delay sensor  
OWARE: OPERAND WIDTH AWARE REDUNDANT EXECUTION FOR WHOLE-PROCESSOR ERROR DETECTION 期刊论文
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 卷号: 17, 期号: 6, 页码: 771-780
作者:  Hu, Yu;  Chen, Zhongliang;  Li, Xiaowei
收藏  |  浏览/下载:68/0  |  提交时间:2019/12/16
narrow-width value  sphere of replication  data-level redundancy  instruction-level redundancy  
A SECURITY MECHANISM FOR RFID WITH DEPENDABLE PROXY 期刊论文
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 卷号: 17, 期号: 6, 页码: 815-825
作者:  Zhou, Jun;  Xu, Yongjun;  Li, Xiaowei
收藏  |  浏览/下载:66/0  |  提交时间:2019/12/16
RFID  physical methods  security protocols  proxy  BAN logic