CSpace

浏览/检索结果: 共4条,第1-4条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Deadline and Reliability Aware Multiserver Configuration Optimization for Maximizing Profit 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 卷号: 33, 期号: 12, 页码: 3772-3786
作者:  Wang, Tian;  Zhou, Junlong;  Li, Liying;  Zhang, Gongxuan;  Li, Keqin;  Hu, Xiaobo Sharon
收藏  |  浏览/下载:31/0  |  提交时间:2022/12/07
Cloud computing  Servers  Reliability  Business  Computer architecture  Real-time systems  Processor scheduling  Cloud service  deadline miss rate  multiserver configuration  profit maximization  soft error reliability  
Enabling In-Network Floating-Point Arithmetic for Efficient Computation Offloading 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 卷号: 33, 期号: 12, 页码: 4918-4934
作者:  Cui, Penglai;  Pan, Heng;  Li, Zhenyu;  Zhang, Penghao;  Miao, Tianhao;  Zhou, Jianer;  Guan, Hongtao;  Xie, Gaogang
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Open area test sites  Arithmetic  Memory management  Task analysis  Training  Standards  Servers  In-network computation  computation offloading  floating-point operation  
HyCA: A Hybrid Computing Architecture for Fault-Tolerant Deep Learning 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 10, 页码: 3400-3413
作者:  Liu, Cheng;  Chu, Cheng;  Xu, Dawen;  Wang, Ying;  Wang, Qianlong;  Li, Huawei;  Li, Xiaowei;  Cheng, Kwang-Ting
收藏  |  浏览/下载:25/0  |  提交时间:2022/12/07
Circuit faults  Computational modeling  Deep learning  Hardware  Redundancy  Neural networks  Computer architecture  Deep learning accelerator (DLA)  fault detection  fault tolerance  hybrid computing architecture (HyCA)  
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective 期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:  Zhu, Yao;  Chen, Yuefeng;  Li, Xiaodan;  Chen, Kejiang;  He, Yuan;  Tian, Xiang;  Zheng, Bolun;  Chen, Yaowu;  Huang, Qingming
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Data models  Perturbation methods  Iterative methods  Training  Distributed databases  Predictive models  Neural networks  Adversarial transferability  adversarial attack  black-box attack