CSpace

浏览/检索结果: 共27条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
CUTE: A scalable CPU-centric and Ultra-utilized Tensor Engine for convolutions 期刊论文
JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 卷号: 149, 页码: 15
作者:  Li, Wenqing;  Ye, Jinpeng;  Zhang, Fuxin;  Liu, Tianyi;  Zhang, Tingting;  Wang, Jian
收藏  |  浏览/下载:3/0  |  提交时间:2024/05/20
Tensor engine  Convolution  Scalable architecture  CPU-centric  Utilization  
Mortar-FP8: Morphing the Existing FP32 Infrastructure for High-Performance Deep Learning Acceleration 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 3, 页码: 878-891
作者:  Li, Hongyan;  Lu, Hang;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/05/20
Deep learning accelerator  deep neural network (DNN)  fp8 format  
A Coordinated Model Pruning and Mapping Framework for RRAM-Based DNN Accelerators 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 7, 页码: 2364-2376
作者:  Qu, Songyun;  Li, Bing;  Zhao, Shixin;  Zhang, Lei;  Wang, Ying
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
AutoML  bit-pruning  deep neural networks (DNNs)  resistive random access memory (RRAM)  
QoE Assessment Model Based on Continuous Deep Learning for Video in Wireless Networks 期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 卷号: 22, 期号: 6, 页码: 3619-3633
作者:  Liu, Xuewen;  Chuai, Gang;  Wang, Xin;  Xu, Zhiwei;  Gao, Weidong
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Quality of experience  Quality of service  Training  Data models  Wireless networks  Computational modeling  Mobile computing  Data-driven QoE assessment  continual deep learning  QoE  QoS mapping  wireless network  cascaded DNNs  
On-Line Fault Protection for ReRAM-Based Neural Networks 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2023, 卷号: 72, 期号: 2, 页码: 423-437
作者:  Li, Wen;  Wang, Ying;  Liu, Cheng;  He, Yintao;  Liu, Lian;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Training  Fault detection  Computational modeling  Image edge detection  Memristors  Neural networks  Kernel  Deep neural network  hard fault  ReRAM  reliability  soft fault  
BitXpro: Regularity-Aware Hardware Runtime Pruning for Deep Neural Networks 期刊论文
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2023, 卷号: 31, 期号: 1, 页码: 90-103
作者:  Li, Hongyan;  Lu, Hang;  Wang, Haoxuan;  Deng, Shengji;  Li, Xiaowei
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Deep learning accelerator  deep neural network (DNN)  hardware runtime pruning  
An Application-oblivious Memory Scheduling System for DNN Accelerators 期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2022, 卷号: 19, 期号: 4, 页码: 26
作者:  Li, Jiansong;  Wang, Xueying;  Chen, Xiaobing;  Li, Guangli;  Dong, Xiao;  Zhao, Peng;  Yu, Xianzhi;  Yang, Yongxin;  Cao, Wei;  Liu, Lei;  Feng, Xiaobing
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Deep learning  memory scheduling  runtime system  DNN accelerators  
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
An Automated Quantization Framework for High-Utilization RRAM-Based PIM 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 3, 页码: 583-596
作者:  Li, Bing;  Qu, Songyun;  Wang, Ying
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Quantization (signal)  Neural networks  Computational modeling  Data models  Hardware  Resource management  Arrays  AutoML  neural network  processing-in-memory (PIM)  quantization  resistive memory (RRAM)  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant