Skip to main content

Showing 1–7 of 7 results for author: Sherwood, T

.
  1. Low-Cost Superconducting Fan-Out with Cell I$_\text{C}$ Ranking

    Authors: Jennifer Volk, George Tzimpragos, Alex Wynn, Evan Golden, Timothy Sherwood

    Abstract: Superconductor electronics (SCE) promise computer systems with orders of magnitude higher speeds and lower energy consumption than their complementary metal-oxide semiconductor (CMOS) counterparts. At the same time, the scalability and resource utilization of superconducting systems are major concerns. Some of these concerns come from device-level challenges and the gap between SCE and CMOS techno… ▽ More

    Submitted 27 March, 2023; v1 submitted 15 June, 2022; originally announced June 2022.

    Comments: 12 pages, 20 figures, accepted at IEEE TAS

  2. arXiv:2205.08016  [pdf, other

    cs.ET cs.AR

    Addressable Superconductor Integrated Circuit Memory from Delay Lines

    Authors: Jennifer Volk, Alex Wynn, Timothy Sherwood, Georgios Tzimpragos

    Abstract: Recent advances in logic schemes and fabrication processes have renewed interest in using superconductor electronics for energy-efficient computing and quantum control processors. However, scalable superconducting memory still poses a challenge. To address this issue, we present an alternative to approaches that solely emphasize storage cell miniaturization by exploiting the minimal attenuation an… ▽ More

    Submitted 17 August, 2023; v1 submitted 16 May, 2022; originally announced May 2022.

    Comments: 13 pages, 8 figures, 1 table, under review

  3. arXiv:2106.01710  [pdf, other

    cs.DC cs.PF cs.PL

    Optimistic Concurrency Control for Real-world Go Programs (Extended Version with Appendix)

    Authors: Zhizhou Zhang, Milind Chabbi, Adam Welc, Timothy Sherwood

    Abstract: We present a source-to-source transformation framework, GOCC, that consumes lock-based pessimistic concurrency programs in the Go language and transforms them into optimistic concurrency programs that use Hardware Transactional Memory (HTM). The choice of the Go language is motivated by the fact that concurrency is a first-class citizen in Go, and it is widely used in Go programs. GOCC performs ri… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

  4. arXiv:2105.03812  [pdf, other

    cs.CV

    Analysis and Mitigations of Reverse Engineering Attacks on Local Feature Descriptors

    Authors: Deeksha Dangwal, Vincent T. Lee, Hyo ** Kim, Tianwei Shen, Meghan Cowan, Rajvi Shah, Caroline Trippel, Brandon Reagen, Timothy Sherwood, Vasileios Balntas, Armin Alaghi, Eddy Ilg

    Abstract: As autonomous driving and augmented reality evolve, a practical concern is data privacy. In particular, these applications rely on localization based on user images. The widely adopted technology uses local feature descriptors, which are derived from the images and it was long thought that they could not be reverted back. However, recent work has demonstrated that under certain conditions reverse… ▽ More

    Submitted 8 May, 2021; originally announced May 2021.

    Comments: 13 pages

  5. arXiv:1907.05700  [pdf, ps, other

    eess.SP cs.AR math.NA

    Efficient Uncertainty Modeling for System Design via Mixed Integer Programming

    Authors: Zichang He, Weilong Cui, Chunfeng Cui, Timothy Sherwood, Zheng Zhang

    Abstract: The post-Moore era casts a shadow of uncertainty on many aspects of computer system design. Managing that uncertainty requires new algorithmic tools to make quantitative assessments. While prior uncertainty quantification methods, such as generalized polynomial chaos (gPC), show how to work precisely under the uncertainty inherent to physical devices, these approaches focus solely on variables fro… ▽ More

    Submitted 20 October, 2019; v1 submitted 10 July, 2019; originally announced July 2019.

    Comments: International Conf. Computer Aided Design (ICCAD), 2019

  6. Neural Network Model Extraction Attacks in Edge Devices by Hearing Architectural Hints

    Authors: Xing Hu, Ling Liang, Lei Deng, Shuangchen Li, Xinfeng Xie, Yu Ji, Yufei Ding, Chang Liu, Timothy Sherwood, Yuan Xie

    Abstract: As neural networks continue their reach into nearly every aspect of software operations, the details of those networks become an increasingly sensitive subject. Even those that deploy neural networks embedded in physical devices may wish to keep the inner working of their designs hidden -- either to protect their intellectual property or as a form of protection from adversarial inputs. The specifi… ▽ More

    Submitted 9 March, 2019; originally announced March 2019.

    Journal ref: ASPLOS-2020

  7. arXiv:1608.00678  [pdf, other

    cs.CR cs.LO

    Report on the NSF Workshop on Formal Methods for Security

    Authors: Stephen Chong, Joshua Guttman, Anupam Datta, Andrew Myers, Benjamin Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich

    Abstract: Report on the NSF Workshop on Formal Methods for Security, held 19-20 November 2015.

    Submitted 3 August, 2016; v1 submitted 1 August, 2016; originally announced August 2016.