Abstract is missing.
- Quantum computing: a scalable, systems approachAnne Matsuura. 1 [doi]
- Leveraging ML to handle the increasing complexity of the cloudChristina Delimitrou. 2 [doi]
- Ultra-compact binary neural networks for human activity recognition on RISC-V processorsFrancesco Daghero, Chen Xie, Daniele Jahier Pagliari, Alessio Burrello, Marco Castellano, Luca Gandolfi, Andrea Calimera, Enrico Macii, Massimo Poncino. 3-11 [doi]
- A comparative survey of open-source application-class RISC-V processor implementationsAlexander Dörflinger, Mark Albers, Benedikt Kleinbeck, Yejun Guan, Harald Michalik, Raphael Klink, Christopher Blochwitz, Anouar Nechi, Mladen Berekovic. 12-20 [doi]
- Dynamic row activation mechanism for multi-core systemsTareq Alawneh, Raimund Kirner, Catherine Menon. 21-29 [doi]
- TEA-fed: time-efficient asynchronous federated learning for edge computingChendi Zhou, Hao Tian, Hong Zhang, Jin Zhang 0001, Mianxiong Dong, Juncheng Jia. 30-37 [doi]
- Intelligent UAV-aided controller placement scheme for software-defined vehicular networksNa Lin, Qi Zhao, Liang Zhao. 38-44 [doi]
- An online guided tuning approach to run CNN pipelines on edge devicesPirah Noor Soomro, Mustafa Abduljabbar, Jerónimo Castrillón, Miquel Pericàs. 45-53 [doi]
- Performance prediction for convolutional neural networks on edge GPUsHalima Bouzidi, Hamza Ouarnoughi, Smaïl Niar, Abdessamad Ait El Cadi. 54-62 [doi]
- DFShards: effective construction of MRCs online for non-stack algorithmsAiling Yu, Yujuan Tan, Congcong Xu, Zhulin Ma, Duo Liu, Xianzhang Chen. 63-72 [doi]
- Exploring the potential of context-aware dynamic CPU undervoltingEmmanouil Maroudas, Spyros Lalis, Nikolaos Bellas, Christos D. Antonopoulos. 73-82 [doi]
- Diolkos: improving ethernet throughput through dynamic port selectionOceane Bel, Joosep Pata, Jean-Roch Vlimant, Nathan R. Tallent, Justas Balcas, Maria Spiropulu. 83-92 [doi]
- A methodology and framework for software memoization of functionsPedro Pinto, João M. P. Cardoso. 93-101 [doi]
- Online model swapping for architectural simulationPatrick Lavin, Jeffrey Young 0001, Richard W. Vuduc, Jonathan Beard. 102-112 [doi]
- Design space for scaling-in general purpose computing within the DDR DRAM hierarchy for map-reduce workloadsSiddhartha Balakrishna Rai, Anand Sivasubramaniam, Adithya Kumar, Prasanna Venkatesh Rengasamy, Vijaykrishnan Narayanan, Ameen Akel, Sean Eilert. 113-123 [doi]
- On the role of system software in energy management of neuromorphic computingTwisha Titirsha, Shihao Song, Adarsha Balaji, Anup Das 0001. 124-132 [doi]
- Reducing quantum annealing biases for solving the graph partitioning problemElijah Pelofske, Georg Hahn, Hristo N. Djidjev. 133-139 [doi]
- A golden age for computing frontiers, a dark age for computing education?Christof Teuscher. 140-143 [doi]
- Scaling of multi-core quantum architectures: a communications-aware structured gap analysisSantiago Rodrigo, Medina Bandic, Sergi Abadal, Hans van Someren, Eduard Alarcón, Carmen G. Almudéver. 144-151 [doi]
- Near real-time intrusion alert aggregation using concept-based learningGordon Werner, Shanchieh Jay Yang, Katie McConky. 152-160 [doi]
- ShuffleFL: gradient-preserving federated learning using trusted execution environmentYuhui Zhang, Zhiwei Wang, Jiangfeng Cao, Rui Hou, Dan Meng. 161-168 [doi]
- An efficient fault tolerant cloud market mechanism for profit maximizationBoyu Li 0002, Guanquan Xu, Bin Wu 0002, Yuhan Dong. 169-177 [doi]
- The Italian research on HPC key technologies across EuroHPCMarco Aldinucci, Giovanni Agosta, Antonio Andreini, Claudio A. Ardagna, Andrea Bartolini, Alessandro Cilardo, Biagio Cosenza, Marco Danelutto, Roberto Esposito, William Fornaciari, Roberto Giorgi, Davide Lengani, Raffaele Montella, Mauro Olivieri, Sergio Saponara, Daniele Simoni, Massimo Torquati. 178-184 [doi]
- When wearable technology meets computing in future networks: a road aheadAleksandr Ometov, Olga Chukhno, Nadezhda Chukhno, Jari Nurmi, Elena Simona Lohan. 185-190 [doi]
- Architecting more than Moore: wireless plasticity for massive heterogeneous computer architectures (WiPLASH)Joshua Klein, Alexandre Levisse, Giovanni Ansaloni, David Atienza, Marina Zapater, Martino Dazzi, Geethan Karunaratne, Irem Boybat, Abu Sebastian, Davide Rossi, Francesco Conti 0001, Elana Pereira de Santana, Peter Haring Bolívar, Mohamed Saeed, Renato Negra, Zhenxing Wang, Kun-Ta Wang, Max C. Lemme, Akshay Jain, Robert Guirado, Hamidreza Taghvaee, Sergi Abadal. 191-193 [doi]
- cREAtIve: reconfigurable embedded artificial intelligencePoona Bahrebar, Leon Denis, Maxim Bonnaerens, Kristof Coddens, Joni Dambre, Wouter Favoreel, Illia Khvastunov, Adrian Munteanu 0001, Hung Nguyen-Duc, Stefan Schulte 0001, Dirk Stroobandt, Ramses Valvekens, Nick Van den Broeck, Geert Verbruggen. 194-199 [doi]
- EVOLVE: HPC and cloud enhanced testbed for extracting value from large-scale diverse dataAntony Chazapis, Jean-Thomas Acquaviva, Angelos Bilas, Georgios Gardikis, Christos Kozanitis, Stelios Louloudakis, Huy Nam Nguyen, Christian Pinto, Arno Scharl, Dimitrios Soudris. 200-205 [doi]
- Evolving 5G: ANIARA, an edge-cloud perspectiveIan Marsh, Nicolae Paladi, Henrik Abrahamsson, Jonas Gustafsson, Johan Sjöberg, Andreas Johnsson, Pontus Sköldström, Jim Dowling, Paolo Monti 0001, Melina Vruna, Mohsen Amiribesheli. 206-207 [doi]
- Scalable topological data analysis for life science applicationsAnanth Kalyanaraman. 208 [doi]
- Graph analytics in the exascale eraMahantesh Halappanavar, Marco Minutoli, Sayan Ghosh. 209 [doi]
- Interactive data science at scaleDavid A. Bader. 210 [doi]
- AvesTerra: a framework for global-scale knowledge representation and analytic interoperabilityJ. C. Smart. 211 [doi]
- Parallel graph algorithms by blocks: from I/O to algorithmsAbdurrahman Yasar, Kasimir Gabert, Ümit V. Çatalyürek. 212 [doi]
- Tapeout of a RISC-V crypto chip with hardware trojans: a case-study on trojan design and pre-silicon detectabilityAlexander Hepp, Georg Sigl. 213-220 [doi]
- A threat model method for ICS malware: the TRISIS caseYassine Mekdad, Giuseppe Bernieri, Mauro Conti, Abdeslam El Fergougui. 221-228 [doi]
- On resilience of security-oriented error detecting architectures against power attacks: a theoretical analysisOsnat Keren, Ilia Polian. 229-237 [doi]
- Fault injection attacks on SoftMax function in deep neural networksDirmanto Jap, Yoo-Seung Won, Shivam Bhasin. 238-240 [doi]