Essays about: "vector instructions"

Showing result 1 - 5 of 15 essays containing the words vector instructions.

  1. 1. Investigation of 8-bit Floating-Point Formats for Machine Learning

    University essay from Linköpings universitet/Datorteknik

    Author : Theodor Lindberg; [2023]
    Keywords : Floating-Point; 8-bit floating-point; FP8; vector instructions; Machine Learning; ML; Convolutional Neural Network; CNN;

    Abstract : Applying machine learning to various applications has gained significant momentum in recent years. However, the increasing complexity of networks introduces challenges such as a larger memory footprint and decreased throughput. This thesis aims to address these challenges by exploring the use of 8-bit floating-point numbers for machine learning. READ MORE

  2. 2. Register Caching for Energy Efficient GPGPU Tensor Core Computing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiran Qian; [2023]
    Keywords : Computer Architecture; GPGPU; Tensor Core; GEMM; Energy Efficiency; Register File; Cache; Instruction Scheduling; Datorarkitektur; GPGPU; Tensor Core; GEMM; energieffektivitet; registerfil; cache; instruktionsschemaläggning;

    Abstract : The General-Purpose GPU (GPGPU) has emerged as the predominant computing device for extensive parallel workloads in the fields of Artificial Intelligence (AI) and Scientific Computing, primarily owing to its adoption of the Single Instruction Multiple Thread architecture, which not only provides a wealth of thread context but also effectively hide the latencies exposed in the single threads executions. As computational demands have evolved, modern GPGPUs have incorporated specialized matrix engines, e. READ MORE

  3. 3. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Xiaoyue Chen; [2022]
    Keywords : ;

    Abstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE

  4. 4. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE

  5. 5. Invasion-analysis of stage-structured populations in temporally-varying environments

    University essay from Umeå universitet/Institutionen för fysik

    Author : Samuel Brändström; [2018]
    Keywords : ;

    Abstract : Climate change may cause epidemic threats as species spreading human diseases invades previously unpopulated areas. A species can establish in new areas if they fulfills an invasion criterion. READ MORE