Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Reordering Functions in Mobiles Apps for Reduced Size and Faster Start-Up
Article No.: 54, pp 1–54https://doi.org/10.1145/3660635

Function layout, also known as function reordering or function placement, is one of the most effective profile-guided compiler optimizations. By reordering functions in a binary, compilers can improve the performance of large-scale applications or reduce ...

research-article
Open Access
On-device Online Learning and Semantic Management of TinyML Systems
Article No.: 55, pp 1–32https://doi.org/10.1145/3665278

Recent advances in Tiny Machine Learning (TinyML) empower low-footprint embedded devices for real-time on-device Machine Learning (ML). While many acknowledge the potential benefits of TinyML, its practical implementation presents unique challenges. This ...

research-article
Open Access
Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe)
Article No.: 56, pp 1–27https://doi.org/10.1145/3663673

Cache Side-Channel Attacks (CSCAs) have been haunting most processor architectures for decades now. Existing approaches to mitigation of such attacks have certain drawbacks, namely software mishandling, performance overhead, and low throughput due to ...

research-article
Coupling bit and modular arithmetic for efficient general-purpose fully homomorphic encryption
Article No.: 57, pp 1–28https://doi.org/10.1145/3665280

Fully Homomorphic Encryption (FHE) enables computation directly on encrypted data. This property is desirable for outsourced computation of sensitive data as it relies solely on the underlying security of the cryptosystem and not in access control ...

research-article
A Review of Abstraction Methods Toward Verifying Neural Networks
Article No.: 58, pp 1–19https://doi.org/10.1145/3617508

Neural networks as a machine learning technique are increasingly deployed in various domains. Despite their performance and their continuous improvement, the deployment of neural networks in safety-critical systems, in particular for autonomous mobility, ...

research-article
Elements of Timed Pattern Matching
Article No.: 59, pp 1–45https://doi.org/10.1145/3645114

The rise of machine learning and cloud technologies has led to a remarkable influx of data within modern cyber-physical systems. However, extracting meaningful information from this data has become a significant challenge due to its volume and complexity. ...

Subjects

Comments