24 papers
28 files
38 references

Papers Referenced in This Repository

FP8 Formats for Deep Learning

Paulius Micikevicius, Dušan Stošić, Neil Burgess, Marius Cornea, Pradeep Dubey, Richard Grisenthwait...
2022
24 references

FP8 is a natural progression for accelerating deep learning training inference beyond the 16-bit formats common in modern processors. In this paper we propose an 8-bit floating point (FP8) binary interchange format consisting of two encodings - E4M3 (4-bit exponent and 3-bit mantissa) and E5M2 (5-bi...

Show 2 references in code

8-bit Numerical Formats for Deep Neural Networks

Badreddine Noune, Philip Jones, Daniel Justus, Dominic Masters, Carlo Luschi
2022
16 references

Given the current trend of increasing size and complexity of machine learning architectures, it has become of critical importance to identify new approaches to improve the computational efficiency of model training. In this context, we address the advantages of floating-point over fixed-point repres...

Show 2 references in code

An Experimental Study of Dynamic Dominators

Loukas Georgiadis, Giuseppe F. Italiano, Luigi Laura, Federico Santaroni
2016
20 citations
4 references

Motivated by recent applications of dominator computations, we consider the problem of dynamically maintaining the dominators of flow graphs through a sequence of insertions and deletions of edges. Our main theoretical contribution is a simple incremental algorithm that maintains the dominator tree ...

Show 2 references in code

Scalable range locks for scalable address spaces and beyond

Alex Kogan, D. Dice, S. Issa
2020
2 references

Range locks are a synchronization construct designed to provide concurrent access to multiple threads (or processes) to disjoint parts of a shared resource. Originally conceived in the file system context, range locks are gaining increasing interest in the Linux kernel community seeking to alleviate...

Show 2 references in code

DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels

Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan
2020
2 references

In this paper, we report a series of flaws in the software stack that leads to a strong revival of DNS cache poisoning --- a classic attack which is mitigated in practice with simple and effective randomization-based defenses such as randomized source port. To successfully poison a DNS cache on a ty...

Show 2 references in code

An efficient algorithm for sequential random sampling

Jeffrey Scott Vitter
1987
1 reference

We examine several methods for drawing a sequential random sample of n records from a file containing N records. Method D is recommended for general use. The algorithm is on-line (so that CPU time can be overlapped with I/O), has a small constant memory requirement, and is easy to program. An improv...

Show 1 reference in code

Cuckoo hashing.

Rasmus Pagh, Flemming Friche Rodler
2004
2 references
Show 1 reference in code

Concurrent Hash Tables

Tobias Maier, Peter Sanders, Roman Dementiev
2019
2 references

Concurrent hash tables are one of the most important concurrent data structures, which are used in numerous applications. For some applications, it is common that hash table accesses dominate the execution time. To efficiently solve these problems in parallel, we need implementations that achieve sp...

Show 1 reference in code

Optimizing Function Layout for Mobile Applications

Ellis Hoag, Kyungwoo Lee, Julián Mestre, Sergey Pupyrev
2022
9 citations
2 references

Function layout, also referred to as function reordering or function placement, is one of the most effective profile-guided compiler optimizations. By reordering functions in a binary, compilers are able to greatly improve the performance of large-scale applications or reduce the compressed size of ...

Show 1 reference in code

R-trees: a dynamic index structure for spatial searching

A. Guttman
1984
2 references

In order to handle spatial data efficiently, as required in computer aided design and geo-data applications, a database system needs an index mechanism that will help it retrieve data items quickly according to their spatial locations However, traditional indexing methods are not well suited to data...

Show 1 reference in code

The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles.

Norbert Beckmann, Hans‐Peter Kriegel, Ralf Schneider, Bernhard Seeger
1990
2 references

The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design the...

Show 1 reference in code

Linear Hashing: A New Tool for File and Table Addressing.

W. Litwin
1980
1 reference

AbstractPolyhydroxyethers were synthesized from monoalkali metal salts of diphenols and 1‐halo‐2,3‐epoxyalkanes in a one‐step reaction in dipolar, aprotic solvents as reaction media. They were also synthesized from alkali metal salts of diphenols, dihalobenzoid compounds with electron‐withdrawing gr...

Show 1 reference in code

Xorshift RNGs

George Marsaglia
2003
2 references

Description of a class of simple, extremely fast random number generators (RNGs) with periods 2k - 1 for k = 32, 64, 96, 128, 160, 192. These RNGs seem to pass tests of randomness very well.

Show 1 reference in code

Digital signature standard (DSS)

National Institute of Standards and Technology (US)
2013
1 reference
Show 1 reference in code

Recommendation for Key Management - Part 1 General

Elaine B. Barker
2014
1 reference

3541 et seq., Public Law (P.L.) 113-283.NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of app...

Show 1 reference in code

Control Chart Tests Based on Geometric Moving Averages

1959
1 reference

A geometrical moving average gives the most recent observation the greatest weight, and all previous observations weights decreasing in geometric progression from the most recent back to the first. A graphical procedure for generating geometric moving averages is described in which the most recent o...

Show 1 reference in code

Fast Random Integer Generation in an Interval

Daniel Lemire
2018
4 references

In simulations, probabilistic algorithms and statistical tests, we often generate random integers in an interval (e.g., [0,s)). For example, random integers in an interval are essential to the Fisher-Yates random shuffle. Consequently, popular languages like Java, Python, C++, Swift and Go include r...

Show 1 reference in code

Rank-Balanced Trees

Bernhard Haeupler, Siddhartha Sen, Robert E. Tarjan
2009
1 reference

Since the invention of AVL trees in 1962, many kinds of binary search trees have been proposed. Notable are red-black trees, in which bottom-up rebalancing after an insertion or deletion takes O(1) amortized time and O(1) rotations worst-case. But the design space of balanced trees has not been full...

Show 1 reference in code
Link copied to clipboard!