Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2023
Memento: Architectural Support for Ephemeral Memory Management in Serverless Environments
MICRO '23: Proceedings of the 56th Annual IEEE/ACM International Symposium on MicroarchitectureOctober 2023, Pages 122–136https://doi.org/10.1145/3613424.3623795Serverless computing is an increasingly attractive paradigm in the cloud due to its ease of use and fine-grained pay-for-what-you-use billing. However, serverless computing poses new challenges to system design due to its short-lived function execution ...
- research-articleJune 2023
Contiguitas: The Pursuit of Physical Memory Contiguity in Datacenters
- Kaiyang Zhao,
- Kaiwen Xue,
- Ziqi Wang,
- Dan Schatzberg,
- Leon Yang,
- Antonis Manousis,
- Johannes Weiner,
- Rik Van Riel,
- Bikash Sharma,
- Chunqiang Tang,
- Dimitrios Skarlatos
ISCA '23: Proceedings of the 50th Annual International Symposium on Computer ArchitectureJune 2023, Article No.: 44, Pages 1–15https://doi.org/10.1145/3579371.3589079The unabating growth of the memory needs of emerging datacenter applications has exacerbated the scalability bottleneck of virtual memory. However, reducing the excessive overhead of address translation will remain onerous until the physical memory ...
- research-articleJanuary 2023
A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT
Journal of High Speed Networks (JHSN), Volume 29, Issue 12023, Pages 41–56https://doi.org/10.3233/JHS-222016With the development of big data technology, medical data has become increasingly important. It not only contains personal privacy information, but also involves medical security issues. This paper proposes a secure data fitting scheme based on CKKS (...
- ArticleNovember 2022
SETFF: A Semantic Enhanced Table Filling Framework for Joint Entity and Relation Extraction
PRICAI 2022: Trends in Artificial IntelligenceNov 2022, Pages 169–182https://doi.org/10.1007/978-3-031-20865-2_13AbstractIn the study of text understanding and knowledge graph construction, the process of extracting entities and relations from unstructured text is crucial. Lately, joint extraction has achieved more significance in this context. Among them, table ...
- research-articleMarch 2022
A privacy preserving homomorphic computing toolkit for predictive computation
Information Processing and Management: an International Journal (IPRM), Volume 59, Issue 2Mar 2022https://doi.org/10.1016/j.ipm.2022.102880AbstractPredictive computation now is a more and more popular paradigm for artificial intelligence. In this article, we discuss how to design a privacy preserving computing toolkit for secure predictive computation in smart cities. Predictive ...
Highlights- We use the Paillier encryption system and Lagrange's interpolation theorem to construct a new threshold public key cryptosystem with trapdoor, this can lower ...
- ArticleSeptember 2021
Finger Vein Recognition Using a Shallow Convolutional Neural Network
- Jiazhen Liu,
- Ziyan Chen,
- Kaiyang Zhao,
- Minjie Wang,
- Zhen Hu,
- Xinwei Wei,
- Yicheng Zhu,
- Yuncong Yu,
- Zhe Feng,
- Hakil Kim,
- Changlong Jin
AbstractDeep learning-based finger vein recognition (FVR) can be classified as either a closed-set architecture (CS-architecture) or an open-set architecture (OS-architecture) based on the system output. The CS-architecture has limited practicality due to ...
- research-articleApril 2021
On-demand-fork: a microsecond fork for memory-intensive and latency-sensitive applications
EuroSys '21: Proceedings of the Sixteenth European Conference on Computer SystemsApril 2021, Pages 540–555https://doi.org/10.1145/3447786.3456258Fork has long been the process creation system call for Unix. At its inception, fork was hailed as an efficient system call due to its use of copy-on-write on memory shared between parent and child processes. However, application memory demand has ...