Articles with "monospace" as a keyword



Photo by cosmicwriter from unsplash

elfPlace: Electrostatics-Based Placement for Large-Scale Heterogeneous FPGAs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2021.3053191

Abstract: elfPlace is a flat nonlinear placement algorithm for large-scale heterogeneous field-programmable gate arrays (FPGAs). We adopt the analogy between placement and electrostatic systems initially proposed by ePlace and extend it to tackle heterogeneous blocks in… read more here.

Keywords: elfplace; large scale; electrostatics; scale heterogeneous ... See more keywords
Photo by mybbor from unsplash

Network Structure and Pinning Control for Stable Behaviors of Boolean Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2021.3116033

Abstract: In this brief, stabilization for Boolean networks (BNs) has been studied, based on network structure (NS) and pinning control (PC). Firstly, the concept of NS for BNs is defined by searching all the relevant variables… read more here.

Keywords: network structure; monospace monospace; boolean networks; pinning control ... See more keywords
Photo by masakaze from unsplash

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2017.2739145

Abstract: As the most widely used mobile platform, Android is also the biggest target for mobile malware. Given the increasing number of Android malware variants, detecting malware families is crucial so that security analysts can identify… read more here.

Keywords: monospace ec2; android malware; ec2 monospace; malware families ... See more keywords
Photo by thinkmagically from unsplash

Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3141391

Abstract: Neural network (NN) inference services enrich many applications, like image classification, object recognition, facial verification, and more. These NN inference services are increasingly becoming an essential offering from cloud computing providers, where end-users’ data are… read more here.

Keywords: neural network; mml; model; cloud ... See more keywords
Photo from wikipedia

PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3231784

Abstract: Privacy-preserving decision trees (DTs) in vertical federated learning are one of the most effective tools to facilitate various privacy-critical applications in reality. However, the main bottleneck of current solutions is their huge overhead, mainly due… read more here.

Keywords: efficient two; decision trees; framework; monospace privdt ... See more keywords
Photo by dulhiier from unsplash

FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3262149

Abstract: Private neural network inference has demonstrated great importance in various privacy-critical scenarios. However, the primary challenge remaining in prior works is that the evaluation on encrypted data levies prohibitively high runtime and communication overhead. In… read more here.

Keywords: neural network; fastsecnet; network; private neural ... See more keywords
Photo by saadahmad_umn from unsplash

Universal Feedback Gain for Modulo-Sum Computation Over the Erasure MAC

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2021.3134827

Abstract: The problem of computing the modulo-sum of independent messages over a finite-field erasure multiple access channel is investigated. The focus is on the role of delayed state feedback for function computation over state dependent multiple… read more here.

Keywords: computation; tex math; inline formula; case ... See more keywords
Photo by saadahmad_umn from unsplash

Platform-Independent Robust Query Processing

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Knowledge and Data Engineering"

DOI: 10.1109/tkde.2017.2664827

Abstract: To address the classical selectivity estimation problem for OLAP queries in relational databases, a radically different approach called PlanBouquet was recently proposed in [1] , wherein the estimation process is completely abandoned and replaced with… read more here.

Keywords: tex math; alternatives inline; inline formula; query ... See more keywords
Photo from wikipedia

Spatio-Temporal Capsule-Based Reinforcement Learning for Mobility-on-Demand Coordination

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Knowledge and Data Engineering"

DOI: 10.1109/tkde.2020.2992565

Abstract: As an alternative means of convenient and smart transportation, mobility-on-demand (MOD), typified by online ride-sharing and connected taxicabs, has been rapidly growing and spreading worldwide. The large volume of complex traffic and the uncertainty of… read more here.

Keywords: mobility demand; reinforcement learning; coordination; demand ... See more keywords

On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2019.2900919

Abstract: Wireless cameras are widely deployed in surveillance systems for security guarding. However, the privacy concerns associated with unauthorized videotaping, are drawing increasing attention recently. Existing detection methods for unauthorized wireless cameras are either limited by… read more here.

Keywords: monospace dewicam; mml; dewicam monospace; mml mml ... See more keywords
Photo by saadahmad_umn from unsplash

Detecting Engine Anomalies Using Batteries

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3119919

Abstract: The automotive industry is increasingly deploying software solutions to provide value-added features for vehicles, especially in the era of vehicle electrification and automation. However, the ever-increasing cyber components of vehicles (i.e., computation, communication, and control)… read more here.

Keywords: mml mml; mml; tex math; inline formula ... See more keywords