Author of the publication

Efficient Pruning for Machine Learning Under Homomorphic Encryption.

, , , , , , , , , , and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 204-225. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Code Generation for Expressions on Super Scalar Machines.. FJCC, page 372-379. IEEE Computer Society, (1986)The resilience wall: Cross-layer solution strategies., , , , , , , , , and 3 other author(s). VLSI-DAT, page 1-11. IEEE, (2014)Heuristic Rule-Based Program Transformations for Enhanced Vectorization.. ICPP (2), page 63-66. Pennsylvania State University Press, (1988)0-271-00654-4.Introducing the Adaptive Energy Management Features of the Power7 Chip., , , , , , , , , and 1 other author(s). IEEE Micro, 31 (2): 60-75 (2011)Understanding Soft Error Resiliency of Blue Gene/Q Compute Chip through Hardware Proton Irradiation and Software Fault Injection., , , and . SC, page 587-596. IEEE Computer Society, (2014)Dynamic power gating with quality guarantees., , , and . ISLPED, page 377-382. ACM, (2009)Saving energy with just in time instruction delivery., , and . ISLPED, page 178-183. ACM, (2002)Computer architecture education in a corporate reengineering program., and . WCAE@HPCA, page 6. ACM, (1996)Performance and power evaluation of an in-line accelerator., , , , , and . Conf. Computing Frontiers, page 81-82. ACM, (2010)Trends and techniques for energy efficient architectures., , , , , , , and . VLSI-SoC, page 276-279. IEEE, (2010)