The proceedings contain 148 papers. The topics discussed include: the nice characters of orthogonal bidimensional vector wavelet packs and orthogonal binary framelets;research on new tabu search algorithm for min-max ...
ISBN:
(纸本)9783642217821
The proceedings contain 148 papers. The topics discussed include: the nice characters of orthogonal bidimensional vector wavelet packs and orthogonal binary framelets;research on new tabu search algorithm for min-max vehicle routing problem;application of measurement and control technology of digital for the power inverter;the design of image process software of dispensing systems;research of SOAP message security model on web services;remote sensing image segmentation using mean shift method;an image registration method based on feature matching;an exploration of research and innovation in basic teaching;an improvement method of fractional-order filter approximation;phased experimental teaching in the college course of computer and information technology;and modeling and simulation of the underground mining transportation system.
The proceedings contain 148 papers. The topics discussed include: the nice characters of orthogonal bidimensional vector wavelet packs and orthogonal binary framelets;research on new tabu search algorithm for min-max ...
ISBN:
(纸本)9783642218019
The proceedings contain 148 papers. The topics discussed include: the nice characters of orthogonal bidimensional vector wavelet packs and orthogonal binary framelets;research on new tabu search algorithm for min-max vehicle routing problem;application of measurement and control technology of digital for the power inverter;the design of image process software of dispensing systems;research of SOAP message security model on web services;remote sensing image segmentation using mean shift method;an image registration method based on feature matching;an exploration of research and innovation in basic teaching;an improvement method of fractional-order filter approximation;phased experimental teaching in the college course of computer and information technology;and modeling and simulation of the underground mining transportation system.
At the end of the 20th century, the 3D printing technology developed from the United States introduced new blood to the field of traditional sculpture, many countries slowly began to try to combine 3D printing technol...
详细信息
This paper aims to present an experimental study of structured crystals, which has been realized by the integrated use of software products for assessment and analysis of crystal lattices, as well as the building of t...
详细信息
The proceedings contain 38 papers. The special focus in this conference is on Embedded computer Systems: Architectures, modeling, and simulation. The topics include: QCEDA: Using Quantum computers for EDA;Real-Ti...
ISBN:
(纸本)9783031783791
The proceedings contain 38 papers. The special focus in this conference is on Embedded computer Systems: Architectures, modeling, and simulation. The topics include: QCEDA: Using Quantum computers for EDA;Real-Time Linux on RISC-V: Long-Term Performance Analysis of PREEMPT_RT Patches;RV-VP2: Unlocking the Potential of RISC-V Packed-SIMD for Embedded Processing;A Novel System simulation Framework for HBM2 FPGA Platforms;ONNX-To-Hardware Design Flow for Adaptive Neural-Network Inference on FPGAs;efficient Post-training Augmentation for Adaptive Inference in Heterogeneous and Distributed IoT Environments;pooling On-the-Go for NoC-Based Convolutional Neural Network Accelerator;Vitamin-V: Serverless Cloud Computing Porting on RISC-V;Design and Implementation of an Open Source OpenGL SC 2.0.1 Installable Client Driver and Offline Compiler;Plan Your Defense: A Comparative Analysis of Leakage Detection Methods on RISC-V Cores;iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys;I2DS: FPGA-Based Deep Learning Industrial Intrusion Detection System;ACRA: A Cutting-Edge Analytics Platform for advanced Real-Time Corruption Risk Assessment and Investigation Prioritization;post Quantum Cryptography research Lines in the Italian Center for Security and Rights in Cyberspace;advancing Future 5G/B5G Systems: The Int5Gent Approach;RISC-V Accelerators, Enablement and Applications for Automotive and Smart Home in the ISOLDE Project;PMDI: An AI-Enabled Ecosystem for Cooperative Urban Mobility;Open Source Software Randomisation Framework for Probabilistic WCET Prediction on Multicore CPUs, GPUs and Accelerators;a Hypervisor Based Platform for the Development and Verification of Reliable Software Applications.
The proceedings contain 38 papers. The special focus in this conference is on Embedded computer Systems: Architectures, modeling, and simulation. The topics include: QCEDA: Using Quantum computers for EDA;Real-Ti...
ISBN:
(纸本)9783031783760
The proceedings contain 38 papers. The special focus in this conference is on Embedded computer Systems: Architectures, modeling, and simulation. The topics include: QCEDA: Using Quantum computers for EDA;Real-Time Linux on RISC-V: Long-Term Performance Analysis of PREEMPT_RT Patches;RV-VP2: Unlocking the Potential of RISC-V Packed-SIMD for Embedded Processing;A Novel System simulation Framework for HBM2 FPGA Platforms;ONNX-To-Hardware Design Flow for Adaptive Neural-Network Inference on FPGAs;efficient Post-training Augmentation for Adaptive Inference in Heterogeneous and Distributed IoT Environments;pooling On-the-Go for NoC-Based Convolutional Neural Network Accelerator;Vitamin-V: Serverless Cloud Computing Porting on RISC-V;Design and Implementation of an Open Source OpenGL SC 2.0.1 Installable Client Driver and Offline Compiler;Plan Your Defense: A Comparative Analysis of Leakage Detection Methods on RISC-V Cores;iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys;I2DS: FPGA-Based Deep Learning Industrial Intrusion Detection System;ACRA: A Cutting-Edge Analytics Platform for advanced Real-Time Corruption Risk Assessment and Investigation Prioritization;post Quantum Cryptography research Lines in the Italian Center for Security and Rights in Cyberspace;advancing Future 5G/B5G Systems: The Int5Gent Approach;RISC-V Accelerators, Enablement and Applications for Automotive and Smart Home in the ISOLDE Project;PMDI: An AI-Enabled Ecosystem for Cooperative Urban Mobility;Open Source Software Randomisation Framework for Probabilistic WCET Prediction on Multicore CPUs, GPUs and Accelerators;a Hypervisor Based Platform for the Development and Verification of Reliable Software Applications.
Efficient processing architectures for irregular data patterns require vector element addressing with flexible indices. Therefore, state-of-the-art SIMD vector extensions implement gather and scatter instructions for ...
详细信息
ISBN:
(纸本)9783031783760;9783031783777
Efficient processing architectures for irregular data patterns require vector element addressing with flexible indices. Therefore, state-of-the-art SIMD vector extensions implement gather and scatter instructions for indexed addressing of data in memory. In vertical vector processors, different data is processed sequentially in parallel lanes and can be exchanged via chaining. This paper proposes an extension of such chaining mechanisms in a vertical vector processor architecture (V2PRO) to flexibly chain not only data but also address offsets between vector lanes. The indirect addressing enables vector access patterns with irregular strides for both register file and memory. The extension has a low hardware overhead of +4.8 % lookup tables and +1.8% registers on a Xilinx Ultrascale+ FPGA. A runtime evaluation for two applications from computer vision, namely Deformable Convolutions and point cloud encoding with PointPillars, demonstrates speedups of at least an order of magnitude with the proposed extension.
With the rapid advancement of computer virtual reality technology, the demand for simulation-based intelligent driving systems in the domains of roads, traffic, vehicles, and safety has become increasingly prominent. ...
详细信息
With the changes in modern families and the needs of infants, traditional parenting methods are no longer able to meet the needs of parents. In order to provide a more advanced and convenient parenting method, this st...
详细信息
Distributed deep learning has become an essential technique for accelerating deep learning, but its performance is often influenced by the heterogeneous computing nodes and heterogeneous communication networks within ...
详细信息
暂无评论