Controlled-channel attacks: Deterministic side channels for untrusted operating systems

Y Xu, W Cui, M Peinado - 2015 IEEE Symposium on Security …, 2015 - ieeexplore.ieee.org
The presence of large numbers of security vulnerabilities in popular feature-rich commodity
operating systems has inspired a long line of work on excluding these operating systems …

Salient object subitizing

J Zhang, S Ma, M Sameki, S Sclaroff… - Proceedings of the …, 2015 - cv-foundation.org
People can immediately and precisely identify 1, 2, 3 or 4 items by a simple glance. The
phenomenon, known as Subitizing, inspires us to pursue the task of Salient Object …

Dark silicon aware runtime mapping for many-core systems: A patterning approach

A Kanduri, MH Haghbayan… - 2015 33rd IEEE …, 2015 - ieeexplore.ieee.org
Limitation on power budget in many-core systems leaves a fraction of on-chip resources
inactive, referred to as dark silicon. In such systems, an efficient run-time application …

IOMPU: Spatial separation for hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non-transparent bridges

D Muench, M Paulitsch… - 2015 IEEE 17th …, 2015 - ieeexplore.ieee.org
Safety-critical systems and in particular mixed-criticality systems require spatial and
temporal separation for their hosted applications and functionalities. Additional constraints …

Dynamic core scaling: Trading off performance and energy beyond DVFS

W Zhang, H Zhang, J Lach - 2015 33rd IEEE International …, 2015 - ieeexplore.ieee.org
Dynamic voltage and frequency scaling (DVFS) is commonly employed on modern
superscalar processors to reduce energy when peak performance is not needed or allowed …

[PDF][PDF] DeepEM3D: Achieving human-level performance on 3D anisotropic EM image segmentation

T Zeng, B Wu, S Ji - 2015 - researchgate.net
Motivation: Progress in 3D electron microscopy (EM) imaging has greatly facilitated
neuroscience research in high-throughput data acquisition. Correspondingly, high …