Skip to main content

Showing 1–9 of 9 results for author: French, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.13777  [pdf, other

    eess.IV cs.CV cs.LG

    Diffeomorphic Multi-Resolution Deep Learning Registration for Applications in Breast MRI

    Authors: Matthew G. French, Gonzalo D. Maso Talou, Thiranja P. Babarenda Gamage, Martyn P. Nash, Poul M. Nielsen, Anthony J. Doyle, Juan Eugenio Iglesias, Yaƫl Balbastre, Sean I. Young

    Abstract: In breast surgical planning, accurate registration of MR images across patient positions has the potential to improve the localisation of tumours during breast cancer treatment. While learning-based registration methods have recently become the state-of-the-art approach for most medical image registration tasks, these methods have yet to make inroads into breast image registration due to certain d… ▽ More

    Submitted 4 October, 2023; v1 submitted 24 September, 2023; originally announced September 2023.

  2. arXiv:2304.05237  [pdf

    cs.CR cs.AR cs.DC cs.PF

    TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation

    Authors: David Bruce Cousins, Yuriy Polyakov, Ahmad Al Badawi, Matthew French, Andrew Schmidt, Ajey Jacob, Benedict Reynwar, Kellie Canida, Akhilesh Jaiswal, Clynn Mathew, Homer Gamil, Negar Neda, Deepraj Soni, Michail Maniatakos, Brandon Reagen, Naifeng Zhang, Franz Franchetti, Patrick Brinich, Jeremy Johnson, Patrick Broderick, Mike Franusich, Bo Zhang, Zeming Cheng, Massoud Pedram

    Abstract: Secure computation is of critical importance to not only the DoD, but across financial institutions, healthcare, and anywhere personally identifiable information (PII) is accessed. Traditional security techniques require data to be decrypted before performing any computation. When processed on untrusted systems the decrypted data is vulnerable to attacks to extract the sensitive information. To ad… ▽ More

    Submitted 18 April, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: 6 pages, 5 figures and 2 tables

  3. arXiv:2303.17118  [pdf, other

    cs.AR cs.CR

    RPU: The Ring Processing Unit

    Authors: Deepraj Soni, Negar Neda, Naifeng Zhang, Benedict Reynwar, Homer Gamil, Benjamin Heyman, Mohammed Nabeel, Ahmad Al Badawi, Yuriy Polyakov, Kellie Canida, Massoud Pedram, Michail Maniatakos, David Bruce Cousins, Franz Franchetti, Matthew French, Andrew Schmidt, Brandon Reagen

    Abstract: Ring-Learning-with-Errors (RLWE) has emerged as the foundation of many important techniques for improving security and privacy, including homomorphic encryption and post-quantum cryptography. While promising, these techniques have received limited use due to their extreme overheads of running on general-purpose machines. In this paper, we present a novel vector Instruction Set Architecture (ISA) a… ▽ More

    Submitted 13 April, 2023; v1 submitted 29 March, 2023; originally announced March 2023.

  4. Collaborating with communities: Citizen Science Flood Monitoring in Urban Informal Settlements

    Authors: Erich Wolff, Matthew French, Noor Ilhamsyah, Mere Jane Sawailau, Diego Ramirez-Lovering

    Abstract: Concerns regarding the impacts of climate change on marginalised communities in the Global South have led to calls for affected communities to be more active as agents in the process of planning for climate change. While the value of involving communities in risk management is increasingly accepted, the development of appropriate tools to support community engagement in flood risk management proje… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Journal ref: Urban Planning. 6(4) (2021) 351-364

  5. arXiv:2006.06806  [pdf, other

    cs.CR

    Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

    Authors: Benjamin Tan, Ramesh Karri, Nimisha Limaye, Abhrajit Sengupta, Ozgur Sinanoglu, Md Moshiur Rahman, Swarup Bhunia, Danielle Duvalsaint, R. D., Blanton, Amin Rezaei, Yuanqi Shen, Hai Zhou, Leon Li, Alex Orailoglu, Zhaokun Han, Austin Benedetti, Luciano Brignone, Muhammad Yasin, Jeyavijayan Rajendran, Michael Zuzak, Ankur Srivastava, Ujjwal Guin, Chandan Karfa, Kanad Basu , et al. (11 additional authors not shown)

    Abstract: Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and modifications while making their way through the geographically-distributed IC supply chain. On the frontier of hardware security are various design-for-trust techniques that claim to protect designs from untrusted… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  6. arXiv:1909.07917  [pdf, other

    cs.CR eess.SY

    Toward Efficient Evaluation of Logic Encryption Schemes: Models and Metrics

    Authors: Yinghua Hu, Vivek V. Menon, Andrew Schmidt, Joshua Monson, Matthew French, Pierluigi Nuzzo

    Abstract: Research in logic encryption over the last decade has resulted in various techniques to prevent different security threats such as Trojan insertion, intellectual property leakage, and reverse engineering. However, there is little agreement on a uniform set of metrics and models to efficiently assess the achieved security level and the trade-offs between security and overhead. This paper addresses… ▽ More

    Submitted 29 July, 2020; v1 submitted 13 September, 2019; originally announced September 2019.

    Comments: This report is an extended version of "Y. Hu, V. Venugopalan, A. Schmidt, J. Monson, M. French, and P. Nuzzo. Security-driven metrics and models for efficient evaluation of logic encryption schemes. In 2019 17th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE). ACM, 2019."

  7. Evaluating Rapid Application Development with Python for Heterogeneous Processor-based FPGAs

    Authors: Andrew G. Schmidt, Gabriel Weisz, Matthew French

    Abstract: As modern FPGAs evolve to include more het- erogeneous processing elements, such as ARM cores, it makes sense to consider these devices as processors first and FPGA accelerators second. As such, the conventional FPGA develop- ment environment must also adapt to support more software- like programming functionality. While high-level synthesis tools can help reduce FPGA development time, there still… ▽ More

    Submitted 11 May, 2017; originally announced May 2017.

    Comments: To appear in 2017 IEEE 25th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM'17)

  8. arXiv:1503.06453  [pdf, other

    quant-ph cs.ET

    Experimental quantum annealing: case study involving the graph isomorphism problem

    Authors: Kenneth M. Zick, Omar Shehab, Matthew French

    Abstract: Quantum annealing is a proposed combinatorial optimization technique meant to exploit quantum mechanical effects such as tunneling and entanglement. Real-world quantum annealing-based solvers require a combination of annealing and classical pre- and post-processing; at this early stage, little is known about how to partition and optimize the processing. This article presents an experimental case s… ▽ More

    Submitted 22 March, 2015; originally announced March 2015.

    Comments: 15 pages, 6 figures

    Journal ref: Sci. Rep. 5, 11168 (2015)

  9. arXiv:1408.4725  [pdf

    cs.SE cs.DC

    High Level Hardware/Software Embedded System Design with Redsharc

    Authors: Sam Skalicky, Andrew G. Schmidt, Matthew French

    Abstract: As tools for designing multiple processor systems-on-chips (MPSoCs) continue to evolve to meet the demands of developers, there exist systematic gaps that must be bridged to provide a more cohesive hardware/software development environment. We present Redsharc to address these problems and enable: system generation, software/hardware compilation and synthesis, run-time control and execution of MPS… ▽ More

    Submitted 20 August, 2014; originally announced August 2014.

    Comments: Presented at First International Workshop on FPGAs for Software Programmers (FSP 2014) (arXiv:1408.4423)

    Report number: FSP/2014/05