9,231 Hits in 3.9 sec

Some Functions Computable with a Fused-Mac

S. Boldo, J.-M. Muller
17th IEEE Symposium on Computer Arithmetic (ARITH'05)  
We give examples of some floating-point functions (such as ulp(x) or Nextafter(x, y)), or some useful tests, that are easily computable using a fused-mac.  ...  Then, we show that, with rounding to the nearest, the error of a fused-mac instruction is exactly representable as the sum of two floating-point numbers. We give an algorithm that computes that error.  ...  will be exactly computed with a fused-mac, allowing to correct the quotient estimation).  ... 
doi:10.1109/arith.2005.39 dblp:conf/arith/BoldoM05 fatcat:u4pldc47uzhbzfq4hpkzdar7na

Accelerating correctly rounded floating-point division when the divisor is known in advance

N. Brisebarre, J.-M. Muller, Saurabh Kumar Raina
2004 IEEE transactions on computers  
We present techniques for accelerating the floating-point computation of x=y when y is known before x. The proposed algorithms are oriented toward architectures with available fused-mac operations.  ...  Index Terms-Computer arithmetic, floating-point arithmetic, division by software, division with fused-mac, compilation optimization. ae 1 MOTIVATION OF THIS RESEARCH WE wish to provide methods for accelerating  ...  The remainder r ¼ x À qy is computed exactly with a fused-mac. That is, ðx À qyÞ ¼ x À qy.  ... 
doi:10.1109/tc.2004.37 fatcat:vyr4a3wjnbaubbufxh5ftrb6ay

Fusing Feature Distribution Entropy with R-MAC Features in Image Retrieval

Pingping Liu, Guixia Gou, Huili Guo, Danyang Zhang, Hongwei Zhao, Qiuzhan Zhou
2019 Entropy  
We propose a novel pooling method, which fuses our proposed FDE with region maximum activations of convolutions (R-MAC) features to improve the performance of image retrieval, as it takes the advantage  ...  Compared with the descriptors computed by R-MAC pooling, our proposed method considers not only the most significant feature values of each region in feature map, but also the distribution difference in  ...  The mAP reaches the maximum with 75.01% when B is equal to 2, and we set B to 2 in the later experiments. Factor α is a parameter used to fuse the computed FDE and R-MAC features.  ... 
doi:10.3390/e21111037 fatcat:a3kpbgfy5jdkjntyw57cf7wxk4

Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact

Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia
2014 IEEE Transactions on Information Forensics and Security  
The research community proposed a loss-resilient aggregation framework called synopsis diffusion which uses duplicateinsensitive algorithms on top of multi-path routing schemes to accurately compute aggregates  ...  Our attack-resilient computation algorithm computes the true aggregate by filtering out the contributions of compromised nodes in the aggregation hierarchy.  ...  In the subsequent aggregation phase, along with the fused synopsisB X , each node X also sends a MAC to BS authenticating its sensed value v X . Node X uses Seed and its own ID to compute its MAC.  ... 
doi:10.1109/tifs.2014.2307197 fatcat:6clbj6fsp5aolec3k5uiri4de4

Secure Data Aggregation in Wireless Sensor Networks Using Randomized Dispersive Routes

S. Vijaya Kumar
2013 IOSR Journal of Computer Engineering  
Newly, the research centre has proposed a strong aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to perfectly compute aggregates  ...  In particular, now present a novel lightweight verification algorithm by which the base station can determine if the computed aggregate (predicate Count or Sum) includes any false input.  ...  In particular, a compromised node can generate a false MAC (in the context of computing the function MAC) in four ways: 1) By using a false; 2) By using a false key; 3) By doing both of 1) and 2); and  ... 
doi:10.9790/0661-1442835 fatcat:26l5svkxebasvalanneiq6jr4m

ADA: Authenticated Data Aggregation in Wireless Sensor Networks

E. G., Shiv Prakash, Venugopal K., S. S., L. M.
2017 International Journal of Computer Applications  
Message Authentication Code (MAC) is generated and transmitted along with the synopsis to ensure integrity.  ...  All nodes in the network store the same key that is used for rekeying operation during each round to generate MAC. Thus ADA ensures data freshness and integrity at a communication cost of O(1).  ...  Once the Key is computed, a MAC are generated using cryptographic hash function authenticating least significant '0' bit it is contributing.  ... 
doi:10.5120/ijca2017914309 fatcat:p6lhbjeyzjcadj6qvphqm4khcq

Ultrasonic Decalcification for Mitral Stenosis with Mitral Annular Calcification : a Case Report

Yuto Narumiya, Hideo Yoshida, Yu Oshima, Yoshimasa Kishi, Shohei Yokoyama, Kenji Yoshida, Munehiro Saiki, Atsushi Tateishi, Keiji Yunoki, Kunikazu Hisamochi
2020 Japanese Journal of Cardiovascular Surgery  
For a case of MS with MAC, we achieved mitral valve plasty by ultrasonic decalcification alone. An 82-year-old male with edema and dyspnea was diagnosed with AS and MS with MAC.  ...  Some mitral cases with MAC can be treated by only decalcification to avoid risky valve replacement. Jpn. J. Cardiovasc.  ...  Echocardiogram revealed aortic stenosis and mitral stenosis with severe mitral annular calcification.Preoperative computed tomogram. Computed tomogram revealed severe mitral annular calcification.  ... 
doi:10.4326/jjcvs.49.275 fatcat:lcq67l2x3bggfchmtiqoujy3na

Larq Compute Engine: Design, Benchmark, and Deploy State-of-the-Art Binarized Neural Networks [article]

Tom Bannink, Arash Bakhtiari, Adam Hillier, Lukas Geiger, Tim de Bruin, Leon Overweel, Jelmer Neeven, Koen Helwegen
2021 arXiv   pre-print
LCE's integration with Larq and a sophisticated MLIR-based converter allow users to move smoothly from training to deployment.  ...  Using LCE, we analyze the performance of existing BNN computer vision architectures and develop QuickNet, a simple, easy-to-reproduce BNN that outperforms existing binary networks in terms of latency and  ...  ACKNOWLEDGEMENTS We are grateful to all contributors to Larq Compute Engine and the Larq Ecosystem, and in particular Arash Bakhtiari for his role in the early development of the framework.  ... 
arXiv:2011.09398v2 fatcat:in43k6t2fvdcbbccuooby36brq

Accelerator-aware Neural Network Design using AutoML [article]

Suyog Gupta, Berkin Akin
2020 arXiv   pre-print
For the Edge TPU in Coral devices, these models enable real-time image classification performance while achieving accuracy typically seen only with larger, compute-heavy models running in data centers.  ...  While neural network hardware accelerators provide a substantial amount of raw compute throughput, the models deployed on them must be co-designed for the underlying hardware architecture to obtain the  ...  ACKNOWLEDGEMENTS This work is made possible through a collaboration spanning several teams across Google.  ... 
arXiv:2003.02838v1 fatcat:awfpfatk2jhehormgwph7hbidy

Attack-resilient hierarchical data aggregation in sensor networks

Sankardas Roy, Sanjeev Setia, Sushil Jajodia
2006 Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks - SASN '06  
Recently several researchers have proposed robust aggregation frameworks, which combine multi-path routing schemes with duplicate-insensitive algorithms, to accurately compute aggregates (e.g., Sum, Count  ...  We show that even if a few compromised nodes contribute false sub-aggregate values, this results in large errors in the aggregate computed at the root of the hierarchy.  ...  Although a compromised node can falsely set some bits in its fused synopsis and forward false MACs corresponding to those bits, the sink will be able to discard any false MACs.  ... 
doi:10.1145/1180345.1180355 dblp:conf/sasn/RoySJ06 fatcat:brn2nzeau5hpjktvqrgstflexu

Student Project - Portable Real-Time 3D Engine [article]

Christoph Müller, Fabian Gärtner
2014 Eurographics State of the Art Reports  
FUSEE ("Furtwangen University Simulation and Entertainment Engine") is a student project at Furtwangen University to develop a cross-platform real-time 3D engine from scratch.  ...  This paper describes the engine and its core functionality as well as the benefits the project provides for education in real-time 3D software development compared to classes where other engines are used  ...  Therefore, FUSEE is not a full-featured interactive game editor with some programming functionality but rather a software library for developing real-time 3D applications without steep learning curves.  ... 
doi:10.2312/eged.20141030 fatcat:tpjuxo3lsfa23c4u3esozdxpzm

Page 95 of Journal of Research and Practice in Information Technology Vol. 24, Issue 3 [page]

1992 Journal of Research and Practice in Information Technology  
With all these icons, the user can quite easily get con- fused as to the function of each icon.  ...  In the Macintosh world, the user is fixed with one button for selecting text only. A common design issue is the use of modifier keys with the mouse to perform some other (yet related) function.  ... 

POSTER: Dr. Watson provides data for post-breach analysis

Wasim Ahmad Bhat, S.M.K. Quadri
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
actions. drWatson, when mounted on top of any concrete file system, works by logging all the operations along with their date time stamps targeted to the below mounted file system.  ...  This paper proposes drWatson, a layered file system that in case of an illegitimate file system access provides data for post-breach analysis to assess the severity of the breach and to trace the intruder's  ...  INTRODUCTION Computer security encompasses concepts and methods for protecting sensitive resources in computer systems.  ... 
doi:10.1145/2508859.2512522 dblp:conf/ccs/BhatQ13 fatcat:vlehuvnjijg2jfyp3ijtrckyfu

Two-stream Attentive CNNs for Image Retrieval

Fei Yang, Jia Li, Shikui Wei, Qinjie Zheng, Ting Liu, Yao Zhao
2017 Proceedings of the 2017 ACM on Multimedia Conference - MM '17  
By fusing these two streams into the Main and Auxiliary CNNs (MAC), image similarity can be computed as the human-being does by reserving the conspicuous content and suppressing the irrelevant regions.  ...  The Main stream focuses on extracting discriminative visual features that are tightly correlated with semantic attributes.  ...  [60] fused various features by extracting the output of pooling layers in VGG and Alexnet for image retrieval. Zhou et al. [61] used the match function to integrate SIFT and CNN features.  ... 
doi:10.1145/3123266.3123396 dblp:conf/mm/YangLWZLZ17 fatcat:dyhuas4dbbcebnvkdhhxxbyu64

CRUST: Cryptographic Remote Untrusted Storage without Public Keys

Erel Geron, Avishai Wool
2007 Fourth International IEEE Security in Storage Workshop  
CRUST must function as an add-on, providing secure file sharing over existing, unmodified file systems. It should support any system with the basic capability of storing files.  ...  Instead, each user shares a long-term key with every other user.  ...  Note that some keys have a computation sequence that is a prefix of other keys' computation sequences. This allows to derive some keys from others.  ... 
doi:10.1109/sisw.2007.4389740 fatcat:qqsaq3wtczey3pk5otxuts5geq
« Previous Showing results 1 — 15 out of 9,231 results