supported in part by the National Natural Science Foundation of China(Grant Nos.62272475,62090023,and 62172430);the National Key R&D Program of China(No.2021YFB0300300);the Natural Science Foundation of Hunan Province of China(Nos.2022JJ10064 and 2021JJ10052);the STIP of Hunan Province(No.2022RC3065);the Key Laboratory of Advanced Microprocessor Chips and Systems.
The rapid development of ISAs has brought the issue of software compatibility to the forefront in the embedded field.To address this challenge,one of the promising solutions is the adoption of a multiple-ISA processor...
This work was supported in part by the China Ministry of Science and Technology under Grant 2015GA600002。
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct...
National Key Research and Development Program of China(2022YFA1203704);National Natural Science Foundation of China(61935003,62021005,62275029)。
Integrated photonic computing has emerged as a promising approach to overcome the limitations of electronic processors in the post-Moore era.However,present integrated photonic computing systems face challenges in ach...
supported by the National Key Research and Development Program of China (No.2020YFB1506703);the National Natural Science Foundation of China (Grant Nos.62072018 and 61732002);the State Key Laboratory of Software Development Environment (No.SKLSDE-2021ZX-06);the Fundamental Research Funds for the Central Universities。
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application portability.Among th...
supported by National Key Research and Development Program of China(Grant No.2020YFB1506703);National Natural Science Foundation of China(Grant Nos.62072018,61732002,U22A2028);State Key Laboratory of Software Development Environment(Grant No.SKLSDE-2021ZX-06);Fundamental Research Funds for the Central Universities(Grant No.YWF-22-L-1127)。
High-performance computing and deep learning domains have been motivating the design of domain-specific processors.Although these processors can provide promising computation capability,they are notorious for exotic p...
supported by the National Key R&D Program of China(2022YFB3103400);the National Natural Science Foundation of China(61732022);the Province Key R&D Program of Shaanxi(2019 ZDLGY12-09);the Mobile Internet Security Innovation Team of Shaanxi Province(2018TD-007);the China 111 Project(B16037).
The elliptic curve scalar multiplication(ECSM)is the core of elliptic curve cryptography(ECC),which directly determines the performance of ECC.In this paper,a novel time-area-efficient and compact design of a 256-bit ...
National Key Research and Development Program of China(Grant No.2018AAA0103300);National Natural Science Foundation of China(Grant Nos.61925208,62102398,U19B2019);Strategic Priority Research Program of Chinese Academy of Science(Grant No.XDB32050200);Beijing Academy of Artificial Intelligence(BAAI)and Beijing Nova Program of Science and Technology(Grant No.Z191100001119093);CAS Project for Young Scientists in Basic Research(Grant No.YSBR-029);Youth Innovation Promotion Association CAS and Xplore Prize。
From the very beginning of computers,universality has been the core focus in the building of computing machines,such as the universal Turing machine,von Neumann architecture,random-access machines,and universal circui...
When it comes to decreasing margins and increasing energy effi-ciency in near-threshold and sub-threshold processors,timing error resilience may be viewed as a potentially lucrative alternative to examine.On the other...
Classification of an object behind a random and unknown scattering medium sets a challenging task for computational imaging and machine vision fields.Recent deep learning-based approaches demonstrated the classificati...
This work is supported in part by the Postdoctoral Science Foundation of China under Grant No.2020M683736;in part by the Teaching reform project of higher education in Heilongjiang Province under Grant No.SJGY20210456;in part by the Natural Science Foundation of Heilongjiang Province of China under Grant No.LH2021F038.
The prediction of processor performance has important referencesignificance for future processors. Both the accuracy and rationality of theprediction results are required. The hierarchical belief rule base (HBRB)can i...