Large language models (LLMs) are foundational to the advancement of state-of-the-art natural language processing (NLP) and computer vision applications. However, their intricate architectures and the complexity of the...
详细信息
With the increasing probability of software errors being caused by hardware transient faults, hardware engineers require better methods to evaluate the impact of faults and determine how to harden their products again...
详细信息
The proceedings contain 239 papers. The topics discussed include: exploration of timing and higher-energy attacks on quantum random access memory;fortifying the NAND flash supply chain with innovative security primiti...
ISBN:
(纸本)9798400710773
The proceedings contain 239 papers. The topics discussed include: exploration of timing and higher-energy attacks on quantum random access memory;fortifying the NAND flash supply chain with innovative security primitives;optimizing supply chain management using permissioned blockchains;systematic use of random self-reducibility in cryptographic code against physical attacks;enhancing privacy-preserving computing with optimized CKKS encryption: a hardware acceleration approach;a hypergraph partitioner utilizing a novel graph generative model;TopoOrderPart: a multi-level scheduling-driven partitioning framework for processor-based emulation;modern fixed-outline floorplanning with rectilinear soft modules;JigsawPlanner: jigsaw-like floorplanner for eliminating whitespace and overlap among complex rectilinear modules;and an effective analytical placement approach to handle fence region constraint.
The horizontal IC design and manufacturing flow creates ample opportunities for unauthorized tampering at various stages, yet there is limited research dedicated to detecting hardware Trojans (HTs) in manufactured ICs...
详细信息
In the context of modern services that use multiple Deep Neural Networks (DNNs), managing workloads on embedded devices presents unique challenges. These devices often incorporate diverse architectures, necessitating ...
详细信息
Spatial learned index is becoming popular as a solution to relieve the intense storage demands and high I/O costs of spatial databases. LISA, the original and most prominent spatial learned index structure, is tailore...
详细信息
The widespread adoption of the FHE (Fully Homomorphic Encryption) CKKS (Cheon-Kim-Kim-Song) encryption algorithm is stunted by its slow software implementation, driving the need for efficient hardware acceleration sol...
详细信息
Hardware Trojan (HT) poses a critical security threat to integrated circuits, which can change circuit functionality or leak sensitive data. HTs are typically activated under low-probability conditions by exploiting &...
详细信息
With the announcement of the most advanced silicon spin quantum-bit (qubit) chip by Intel, silicon-based quantum circuit manufacturing technology has shown the superior potential to realize quantum computing to other ...
详细信息
Memristor-based Computation-In-Memory (CIM) has emerged as a compelling paradigm for designing energy-efficient neural network hardware. However, memristors suffer from conductance variation issue, which introduces co...
详细信息
暂无评论