Author of the publication

Pruning hardware evaluation space via correlation-driven application similarity analysis.

, , , , , and . Conf. Computing Frontiers, page 4. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting the supply chain for automotives and IoTs., , and . DAC, page 89:1-89:4. ACM, (2018)nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data., , , and . CF, page 3-13. ACM, (2019)FHEmem: A Processing In-Memory Accelerator for Fully Homomorphic Encryption., , , , , , , , , and . CoRR, (2023)Tolerating Defects in Low-Power Neural Network Accelerators Via Retraining-Free Weight Approximation., , , , and . ACM Trans. Embed. Comput. Syst., 20 (5s): 85:1-85:21 (2021)PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data., , , and . ICCD, page 333-336. IEEE, (2019)Effective Evaluation of Multi-core Based Systems., , , and . ISPDC, page 19-25. IEEE, (2013)Pruning hardware evaluation space via correlation-driven application similarity analysis., , , , , and . Conf. Computing Frontiers, page 4. ACM, (2011)Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims., , , , , , , , , and 49 other author(s). CoRR, (2020)Intel HERACLES: Homomorphic Encryption Revolutionary Accelerator with Correctness for Learning-oriented End-to-End Solutions.. CCSW, page 3. ACM, (2022)Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography., , , and . J. Signal Process. Syst., 93 (10): 1139-1148 (2021)