Essays about: "vector instructions"
Showing result 1 - 5 of 15 essays containing the words vector instructions.
-
1. Investigation of 8-bit Floating-Point Formats for Machine Learning
University essay from Linköpings universitet/DatorteknikAbstract : Applying machine learning to various applications has gained significant momentum in recent years. However, the increasing complexity of networks introduces challenges such as a larger memory footprint and decreased throughput. This thesis aims to address these challenges by exploring the use of 8-bit floating-point numbers for machine learning. READ MORE
-
2. Register Caching for Energy Efficient GPGPU Tensor Core Computing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The General-Purpose GPU (GPGPU) has emerged as the predominant computing device for extensive parallel workloads in the fields of Artificial Intelligence (AI) and Scientific Computing, primarily owing to its adoption of the Single Instruction Multiple Thread architecture, which not only provides a wealth of thread context but also effectively hide the latencies exposed in the single threads executions. As computational demands have evolved, modern GPGPUs have incorporated specialized matrix engines, e. READ MORE
-
3. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE
-
4. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE
-
5. Invasion-analysis of stage-structured populations in temporally-varying environments
University essay from Umeå universitet/Institutionen för fysikAbstract : Climate change may cause epidemic threats as species spreading human diseases invades previously unpopulated areas. A species can establish in new areas if they fulfills an invasion criterion. READ MORE