期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (5)
Application-level approximate computing exploits inherent resilience of adaptive applications, and trades off application output quality for runtime s......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (9)
As a powerful unsupervised learning method, Generative Adversarial Network (GAN) plays an essential role in many domains. However, training a GAN impo......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (7)
Discrete Gaussian distribution plays an essential role in lattice cryptography whereas naive implementations suffer from timing attacks. Unfortunately......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (10)
The releases of Intel SGX and AMD SEV mark the transition of hardware-based enclaves from research prototypes to mainstream products. These two paradi......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (10)
Linux servers are being used in almost all clouds, datacenters and supercomputers today. Linux Kernel functions are facing a kind of malware attacks, ......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (5)
In-memory error correction code (ECC) is a promising technique to improve the yield and reliability of high density memory design. However, the use of......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (9)
Mobile game has become a big industry, whose success heavily depends on the game fairness. Recently, a new type of physical cheating instrument, the c......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (5)
A simplified approach to accelerate matrix factorization of big data is to parallelize it. A commonly used method is to divide the matrix into multipl......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (9)
Graph neural networks (GNNs) emerge as a powerful approach to process non-euclidean data structures and have been proved powerful in various applicati......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (9)
Memcached is a widely used in-memory caching solution in large-scale searching scenarios. The most crucial metric of Memcached systems is the response......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (10)
Synchronization is a crucial issue for multi-threaded programs. Mutex locks are widely used in legacy programs and are still popular for the intuition......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (7)
Existing persistent memory file systems exploit the fast, byte-addressable persistent memory (PM) to boost storage performance but ignore the limited ......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (5)
Clustering algorithms are becoming popular and widely applied in many academic fields, such as machine learning, pattern recognition, and artificial i......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (7)
Speculative execution side-channel vulnerabilities such as Spectre reveal that conventional architecture designs lack security consideration. This art......
期刊: IEEE TRANSACTIONS ON COMPUTERS, 2021; 70 (10)
Support vector machine (SVM) classification techniques have been widely adopted for building clinical decision models. In cloud-based remote clinical ......