Searched for: department%3A%22Quantum%255C+%2526%255C+Computer%255C+Engineering%22
(1 - 20 of 154)

Pages

document
Brown, Jason I. (author), Kolokolnikov, Theodore (author), Kooij, Robert (author)
We introduce two new methods for approximating the all-terminal reliability of undirected graphs. First, we introduce an edge removal process: remove edges at random, one at a time, until the graph becomes disconnected. We show that the expected number of edges thus removed is equal to (Formula presented.), where (Formula presented.) is the...
journal article 2024
document
Finocchio, Giovanni (author), Incorvia, Jean Anne C. (author), Friedman, Joseph S. (author), Yang, Qu (author), Giordano, Anna (author), Grollier, Julie (author), Yang, Hyunsoo (author), Cotofana, S.D. (author), Lin, Peng (author)
In the ‘Beyond Moore’s Law’ era, with increasing edge intelligence, domain-specific computing embracing unconventional approaches will become increasingly prevalent. At the same time, adopting a variety of nanotechnologies will offer benefits in energy cost, computational speed, reduced footprint, cyber resilience, and processing power. The...
review 2024
document
Köylü, T.C. (author)
Machine learning has gained a lot of recognition recently and is now being used in many important applications. However, this recognition was limited in the hardware security area. Especially, very few approaches depend on this powerful tool to detect attacks during operation. This thesis reduces this gap in the field of fault injection attack...
doctoral thesis 2023
document
Abunahla, H.N. (author)
contribution to periodical 2023
document
Wang, F. (author), Cetinay, Hale (author), He, Zhidong (author), Liu, L. (author), Van Mieghem, P.F.A. (author), Kooij, Robert (author)
For this study, we investigated efficient strategies for the recovery of individual links in power grids governed by the direct current (DC) power flow model, under random link failures. Our primary objective was to explore the efficacy of recovering failed links based solely on topological network metrics. In total, we considered 13 recovery...
journal article 2023
document
Yaldagard, Mohammad Amin (author), Diware, S.S. (author), Joshi, R.V. (author), Hamdioui, S. (author), Bishnoi, R.K. (author)
Resistive random access memory (RRAM) based computation-in-memory (CIM) architectures can meet the unprecedented energy efficiency requirements to execute AI algorithms directly on edge devices. However, the read-disturb problem associated with these architectures can lead to accumulated computational errors. To achieve the necessary level of...
conference paper 2023
document
Zahedi, M.Z. (author), Shahroodi, T. (author), Wong, J.S.S.M. (author), Hamdioui, S. (author)
The vast potential of memristor-based computation-in-memory (CIM) engines has mainly triggered the mapping of best-suited applications. Nevertheless, with additional support, existing applications can also benefit from CIM. In particular, this paper proposes an energy and area-efficient CIM-based methodology to perform arithmetic signed...
journal article 2023
document
Wang, F. (author), Kooij, Robert (author)
Network controllability is a critical attribute of dynamic networked systems. Investigating methods to restore network controllability after network degradation is crucial for enhancing system resilience. In this study, we develop an analytical method based on degree distributions to estimate the minimum fraction of required driver nodes for...
journal article 2023
document
Sahebi, Amin (author), Barbone, Marco (author), Procaccini, Marco (author), Luk, Wayne (author), Gaydadjiev, G. (author), Giorgi, Roberto (author)
Processing large-scale graphs is challenging due to the nature of the computation that causes irregular memory access patterns. Managing such irregular accesses may cause significant performance degradation on both CPUs and GPUs. Thus, recent research trends propose graph processing acceleration with Field-Programmable Gate Arrays (FPGA)....
journal article 2023
document
Gomony, Manil Dev (author), de Putter, Floran (author), Gebregiorgis, A.B. (author), Paulin, Gianna (author), Mei, Linyan (author), Jain, Vikram (author), Hamdioui, S. (author), Bishnoi, R.K. (author), Sanchez, Victor (author)
With the rise of deep learning (DL), our world braces for artificial intelligence (AI) in every edge device, creating an urgent need for edge-AI SoCs. This SoC hardware needs to support high throughput, reliable and secure AI processing at ultra-low power (ULP), with a very short time to market. With its strong legacy in edge solutions and open...
conference paper 2023
document
Shahroodi, Taha (author), Cardoso, Rafaela (author), Zahedi, M.Z. (author), Wong, J.S.S.M. (author), Bosio, Alberto (author), O'Connor, Ian (author), Hamdioui, S. (author)
This paper investigates the potential of a compute-in-memory core based on optical Phase Change Materials (oPCMs) to speed up and reduce the energy consumption of the Matrix-Matrix-Multiplication operation. The paper also proposes a new data mapping for Binary Neural Networks (BNNs) tailored for our oPCM core. The preliminary results show a...
conference paper 2023
document
Köylü, T.C. (author), Reinbrecht, Cezar (author), Gebregiorgis, A.B. (author), Hamdioui, S. (author), Taouil, M. (author)
Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant number of them use machine learning, which is proven to be very effective in other domains. This survey, as one of the early attempts, presents the usage of machine...
journal article 2023
document
Zahedi, M.Z. (author), Custers, Geert (author), Shahroodi, Taha (author), Gaydadjiev, G. (author), Wong, J.S.S.M. (author), Hamdioui, S. (author)
Performing analysis on large graph datasets in an energy-efficient manner has posed a significant challenge; not only due to excessive data movements and poor locality, but also due to the non-optimal use of high sparsity of such datasets. The latter leads to a waste of resources as the computation is also performed on zero's operands which do...
conference paper 2023
document
Yuan, S. (author), Taouil, M. (author), Fieback, M. (author), Xun, H. (author), Marinissen, Erik Jan (author), Kar, Gouri Sankar (author), Rao, Sidharth (author), Couet, Sebastien (author), Hamdioui, S. (author)
The development of Spin-transfer torque magnetic RAM (STT-MRAM) mass production requires high-quality dedicated test solutions, for which understanding and modeling of manufacturing defects of the magnetic tunnel junction (MTJ) is crucial. This paper introduces and characterizes a new defect called Back-Hopping (BH); it also provides its...
conference paper 2023
document
Xun, H. (author), Fieback, M. (author), Yuan, S. (author), Zhang, Ziwei (author), Taouil, M. (author), Hamdioui, S. (author)
Resistive Random Access Memory (RRAM) is a potential technology to replace conventional memories by providing low power consumption and high-density storage. As various manufacturing vendors make significant efforts to push it to high-volume production and commercialization, high-quality and efficient test solutions are of great importance. This...
conference paper 2023
document
Fieback, M. (author), Bradarić, Filip (author), Taouil, M. (author), Hamdioui, S. (author)
Resistive Random Access Memory (RRAM, or ReRAM) is a promising memory technology to replace Flash because of its low power consumption, high storage density, and simple integration in existing IC production processes. This has motivated many companies to invest in this technology. However, RRAM manufacturing introduces new failure mechanisms and...
conference paper 2023
document
Singh, A. (author), Bishnoi, R.K. (author), Kaichouhi, A. (author), Diware, S.S. (author), Joshi, R.V. (author), Hamdioui, S. (author)
Analog computation-in-memory (CIM) architecture alleviates massive data movement between the memory and the processor, thus promising great prospects to accelerate certain computational tasks in an energy-efficient manner. However, data converters involved in these architectures typically achieve the required computing accuracy at the expense...
conference paper 2023
document
Diware, S.S. (author), Gebregiorgis, A.B. (author), Joshi, R.V. (author), Hamdioui, S. (author), Bishnoi, R.K. (author)
Memristor-based computation-in-memory (CIM) can achieve high energy efficiency by processing the data within the memory, which makes it well-suited for applications like neural networks. However, memristors suffer from conductance variation problem where their programmed conductance values deviate from the desired values. Such variations lead...
conference paper 2023
document
Wezeman, Robert S. (author), Neumann, N.M.P. (author), Phillipson, F. (author), Kooij, Robert (author)
In this paper we study encounter-based density estimation using different random walks and analyse the effects of the step-size on the convergence of the density approximation. Furthermore, we analyse different types of random walks, namely, a uniform random walk, with every position equally likely to be visited next, a classical random walk...
conference paper 2023
document
Sarkar, A. (author), Al-Ars, Z. (author), Bertels, K.L.M. (author)
In this research, we extend the universal reinforcement learning agent models of artificial general intelligence to quantum environments. The utility function of a classical exploratory stochastic Knowledge Seeking Agent, KL-KSA, is generalized to distance measures from quantum information theory on density matrices. Quantum process...
conference paper 2023
Searched for: department%3A%22Quantum%255C+%2526%255C+Computer%255C+Engineering%22
(1 - 20 of 154)

Pages