Skip to main content

Showing 1–13 of 13 results for author: Tsay, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.03410  [pdf, other

    stat.ML cs.DC cs.LG

    Scalable High-Dimensional Multivariate Linear Regression for Feature-Distributed Data

    Authors: Shuo-Chieh Huang, Ruey S. Tsay

    Abstract: Feature-distributed data, referred to data partitioned by features and stored across multiple computing nodes, are increasingly common in applications with a large number of features. This paper proposes a two-stage relaxed greedy algorithm (TSRGA) for applying multivariate linear regression to such data. The main advantage of TSRGA is that its communication complexity does not depend on the featu… ▽ More

    Submitted 10 March, 2024; v1 submitted 7 July, 2023; originally announced July 2023.

  2. arXiv:2209.09388  [pdf

    cs.CR

    An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery

    Authors: Wei-Hsin Chang, Ren-Song Tsay

    Abstract: In this paper, we propose a very secure and reliable owner-self-managed private key recovery method. In recent years, Public Key Authentication (PKA) method has been identified as the most feasible online security solution. However, losing the private key also implies the risk of losing the ownership of the assets associated with the private key. For key protection, the commonly adopted something-… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

  3. arXiv:2112.01660  [pdf, other

    cs.CL cs.AI

    The Influence of Data Pre-processing and Post-processing on Long Document Summarization

    Authors: Xinwei Du, Kailun Dong, Yuchen Zhang, Yongsheng Li, Ruei-Yu Tsay

    Abstract: Long document summarization is an important and hard task in the field of natural language processing. A good performance of the long document summarization reveals the model has a decent understanding of the human language. Currently, most researches focus on how to modify the attention mechanism of the transformer to achieve a higher ROUGE score. The study of data pre-processing and post-process… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

  4. arXiv:2110.06413  [pdf

    cs.CR

    3LSAA: A Secure And Privacy-preserving Zero-knowledge-based Data-sharing Approach Under An Untrusted Environment

    Authors: Wei-Yi Kuo, Ren-Song Tsay

    Abstract: As data collection and analysis become critical functions for many cloud applications, proper data sharing with approved parties is required. However, the traditional data sharing scheme through centralized data escrow servers may sacrifice owners' privacy and is weak in security. Mainly, the servers physically own all data while the original data owners have only virtual ownership and lose actual… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: 21 pages, 7 figures

  5. arXiv:2109.05896  [pdf

    cs.SE cs.PF

    A Precise Program Phase Identification Method Based on Frequency Domain Analysis

    Authors: Hsuan-Yi Lin, Ren-Song Tsay

    Abstract: In this paper, we present a systematic approach that transforms the program execution trace into the frequency domain and precisely identifies program phases. The analyzed results can be embedded into program code to mark the starting point and execution characteristics, such as CPI (Cycles per Instruction), of each phase. The so generated information can be applied to runtime program phase predic… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  6. arXiv:2109.04621  [pdf

    cs.PF

    An Effective Early Multi-core System Shared Cache Design Method Based on Reuse-distance Analysis

    Authors: Hsin-Yu Ho, Ren-Song Tsay

    Abstract: In this paper, we proposed an effective and efficient multi-core shared-cache design optimization approach based on reuse-distance analysis of the data traces of target applications. Since data traces are independent of system hardware architectures, a designer can easily compute the best cache design at the early system design phase using our approach. We devise a very efficient and yet accurate… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  7. arXiv:2109.04614  [pdf

    cs.AR

    A Fast-and-Effective Early-Stage Multi-level Cache Optimization Method Based on Reuse-Distance Analysis

    Authors: Cheng-Lin Tsai, Ren-Song Tsay

    Abstract: In this paper, we propose a practical and effective approach allowing designers to optimize multi-level cache size at the early system design phase. Our key contribution is to generalize the reuse distance analysis method and develop an effective and practical cache design optimization approach. We adopt a simple scanning search method to locate optimal cache solutions in terms of cache size, powe… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  8. arXiv:2109.04605  [pdf

    cs.DC cs.OS cs.PF

    Analytical Process Scheduling Optimization for Heterogeneous Multi-core Systems

    Authors: Chien-Hao Chen, Ren-Song Tsay

    Abstract: In this paper, we propose the first optimum process scheduling algorithm for an increasingly prevalent type of heterogeneous multicore (HEMC) system that combines high-performance big cores and energy-efficient small cores with the same instruction-set architecture (ISA). Existing algorithms are all heuristics-based, and the well-known IPC-driven approach essentially tries to schedule high scaling… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  9. arXiv:2109.04148  [pdf

    cs.PF

    Automatic Timing-Coherent Transactor Generation for Mixed-level Simulations

    Authors: Li-Chun Chen, Hsin-I Wu, Ren-Song Tsay

    Abstract: In this paper we extend the concept of the traditional transactor, which focuses on correct content transfer, to a new timing-coherent transactor that also accurately aligns the timing of each transaction boundary so that designers can perform precise concurrent system behavior analysis in mixed-abstraction-level system simulations which are essential to increasingly complex system designs. To str… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  10. arXiv:2109.04142  [pdf

    cs.DC

    An Effective Parallel Program Debugging Approach Based on Timing Annotation

    Authors: Yun Chang, Hsin-I Wu, Ren-Song Tsay

    Abstract: We propose an effective parallel program debugging approach based on the timing annotation technique. With prevalent multi-core platforms, parallel programming is required to fully utilize the computing power. However, the non-determinism property and the associated concurrency bugs are notorious and remain to be great challenge to designers. We hence propose an effective program debugging approac… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  11. arXiv:2107.08382  [pdf

    cs.CV cs.LG

    A High-Performance Adaptive Quantization Approach for Edge CNN Applications

    Authors: Hsu-Hsun Chin, Ren-Song Tsay, Hsin-I Wu

    Abstract: Recent convolutional neural network (CNN) development continues to advance the state-of-the-art model accuracy for various applications. However, the enhanced accuracy comes at the cost of substantial memory bandwidth and storage requirements and demanding computational resources. Although in the past the quantization methods have effectively reduced the deployment cost for edge devices, it suffer… ▽ More

    Submitted 18 July, 2021; originally announced July 2021.

  12. arXiv:2010.11686  [pdf

    cs.LG cs.AR cs.CV

    A Very Compact Embedded CNN Processor Design Based on Logarithmic Computing

    Authors: Tsung-Ying Lu, Hsu-Hsun Chin, Hsin-I Wu, Ren-Song Tsay

    Abstract: In this paper, we propose a very compact embedded CNN processor design based on a modified logarithmic computing method using very low bit-width representation. Our high-quality CNN processor can easily fit into edge devices. For Yolov2, our processing circuit takes only 0.15 mm2 using TSMC 40 nm cell library. The key idea is to constrain the activation and weight values of all layers uniformly to… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  13. arXiv:1906.05358  [pdf, other

    stat.ML cs.LG stat.ME

    Tensor Canonical Correlation Analysis with Convergence and Statistical Guarantees

    Authors: You-Lin Chen, Mladen Kolar, Ruey S. Tsay

    Abstract: In many applications, such as classification of images or videos, it is of interest to develop a framework for tensor data instead of an ad-hoc way of transforming data to vectors due to the computational and under-sampling issues. In this paper, we study convergence and statistical properties of two-dimensional canonical correlation analysis \citep{Lee2007Two} under an assumption that data come f… ▽ More

    Submitted 11 November, 2020; v1 submitted 12 June, 2019; originally announced June 2019.