Author of the publication

Optimizing Depthwise Convolutions on ARMv8 Architecture.

, , , , , , , and . PDCAT, volume 13798 of Lecture Notes in Computer Science, page 441-452. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal region gradated fusion based automatic image stitching for industrial systems., , , , , and . ICIT, page 1-7. IEEE, (2022)Optimizing Pointwise Convolutions on Multi-core DSPs., , , , and . ICA3PP (7), volume 14493 of Lecture Notes in Computer Science, page 209-223. Springer, (2023)PruX: Communication Pruning of Parallel BFS in the Graph 500 Benchmark., , , and . ICA3PP (1), volume 11334 of Lecture Notes in Computer Science, page 106-121. Springer, (2018)Parallel convolution algorithm using implicit matrix multiplication on multi-core CPUs., , , and . IJCNN, page 1-7. IEEE, (2019)Model Provenance Management in MLOps Pipeline., , , and . ICCDE, page 45-50. ACM, (2022)An Active Data Leakage Prevention Model for Insider Threat., , , , and . IPTC, page 39-42. IEEE Computer Society, (2011)GraphMedia: Communication-balanced Graph Searching for Billion-scale Social Media Access., , , , , , , and . ACM Multimedia, page 8984-8993. ACM, (2023)A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database., , , and . Symmetry, 10 (11): 637 (2018)Edge Network Routing Protocol Base on Target Tracking Scenario., , , , , , and . Mob. Networks Appl., 26 (6): 2230-2241 (2021)RiskQ: Risk-sensitive Multi-Agent Reinforcement Learning Value Factorization., , , , , , , and . CoRR, (2023)