期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A survey of neural network accelerator with software development environments
1
作者 Jin Song Xuemeng Wang +2 位作者 Zhipeng Zhao Wei Li Tian Zhi 《Journal of Semiconductors》 EI CAS CSCD 2020年第2期20-28,共9页
Recent years,the deep learning algorithm has been widely deployed from cloud servers to terminal units.And researchers proposed various neural network accelerators and software development environments.In this article... Recent years,the deep learning algorithm has been widely deployed from cloud servers to terminal units.And researchers proposed various neural network accelerators and software development environments.In this article,we have reviewed the representative neural network accelerators.As an entirety,the corresponding software stack must consider the hardware architecture of the specific accelerator to enhance the end-to-end performance.And we summarize the programming environments of neural network accelerators and optimizations in software stack.Finally,we comment the future trend of neural network accelerator and programming environments. 展开更多
关键词 neural network accelerator compiling optimization programming environments
下载PDF
AgamottoEye:Recovering Request Flow for Cloud Systems via Log Analysis
2
作者 Jie Lu Feng Li Lian Li 《Journal of Computer Science Research》 2019年第2期30-34,共5页
Cloud applications are implemented on top of different distributed systems to provide online service.A service request is decomposed into multiple sub-tasks,which are dispatched to different distributed systems compon... Cloud applications are implemented on top of different distributed systems to provide online service.A service request is decomposed into multiple sub-tasks,which are dispatched to different distributed systems components.For cloud providers,monitoring the execution of a service request is crucial to promptly find problems that may compromise cloud availability.In this paper,we present AgamottoEye,to automatically construct request flow from existing logs.AgamottoEye addresses the challenges of analyzing interleaved log instances,and can successfully extract request flow spread across multiple distributed systems.Our experiments with Hadoop2/YARN show that AgamottoEye can analyze 25,050 log instances in 57.4s,and the extracted request flow information is helpful with error detection and diagnosis. 展开更多
关键词 Cloud applications Log analysis Request flow
下载PDF
Practices of backuping homomorphically encrypted databases
3
作者 Sa WANG Yiwen SHAO Yungang BAO 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第2期220-230,共11页
Ideal homomorphic encryption is theoretically achievable but impractical in reality due to tremendous computing overhead. Homomorphically encrypted databases, such as CryptDB, leverage replication with partially homom... Ideal homomorphic encryption is theoretically achievable but impractical in reality due to tremendous computing overhead. Homomorphically encrypted databases, such as CryptDB, leverage replication with partially homomorphic encryption schemes to support different SQL queries over encrypted data directly. These databases reach a balance between security and efficiency, but incur considerable storage overhead, especially when making backups. Unfortunately, general data compression techniques relying on data similarity exhibit inefficiency on encrypted data. We present CryptZip, a backup and recovery system that could highly reduce the backup storage cost of encrypted databases. The key idea is to leverage the metadata information of encryption schemes and selectively backup one or several columns among semantically redundant columns. The experimental results show that CryptZip could reduce up to 90.5% backup storage cost on TPC-C benchmark. 展开更多
关键词 homomorphic ENCRYPTION SECURITY DEDUPLICATION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部