ACM Computing Frontiers Conference, CF 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Software-defined networks in large-scale radio telescopes

P. Chris Broekema, Damiaan R. Twelker, Daniel C. Romão, Paola Grosso, Rob V. van Nieuwpoort, Henri E. Bal

Software-defined networks in large-scale radio telescopes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Center for High-Performance Reconfigurable Computing (CHREC): A Ten-Year Odyssey

W. Feng, A. George, H. Lamm, M. Wirthlin

Center for High-Performance Reconfigurable Computing (CHREC): A Ten-Year Odyssey

Details
Discussion Comments: 0
Verification: Authors have not verified information

Social Engineering 2.0: A Foundational Work: Invited Paper

Davide Ariu, Enrico Frumento, Giorgio Fumera

Social Engineering 2.0: A Foundational Work: Invited Paper

Details
Discussion Comments: 0
Verification: Authors have not verified information

Evolution of Friendship: a case study of MobiClique

JooYoung Lee, Konstantin Lopatin, Rasheed Hussain, Waqas Nawaz

Evolution of Friendship: a case study of MobiClique

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Runtime Aware Architectures

Mateo Valero

Runtime Aware Architectures

Details
Discussion Comments: 0
Verification: Author has not verified information

DCT Learning-Based Hardware Design for Neural Signal Acquisition Systems

Cosimo Aprile, Johannes Wüthrich, Luca Baldassarre, Yusuf Leblebici, Volkan Cevher

DCT Learning-Based Hardware Design for Neural Signal Acquisition Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

HELICoiD: interdisciplinary and collaborative project for real-time brain cancer detection: Invited Paper

Rubén Salvador, Samuel Ortega, Daniel Madroñal, Himar Fabelo, Raquel Lazcano, Gustavo Marrero Callicó, Eduardo Juárez, Roberto Sarmiento, César Sanz

HELICoiD: interdisciplinary and collaborative project for real-time brain cancer detection: Invited Paper

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stream Drive: A Dynamic Dataflow Framework For Clustered Embedded Architectures

Arthur Stoutchinin, Luca Benini

Stream Drive: A Dynamic Dataflow Framework For Clustered Embedded Architectures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analytical Performance Modeling and Validation of Intel's Xeon Phi Architecture

Sudheer Chunduri, Prasanna Balaprakash, Vitali A. Morozov, Venkatram Vishwanath, Kalyan Kumaran

Analytical Performance Modeling and Validation of Intel's Xeon Phi Architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

SGXKernel: A Library Operating System Optimized for Intel SGX

Hongliang Tian, Yong Zhang, Chunxiao Xing, Shoumeng Yan

SGXKernel: A Library Operating System Optimized for Intel SGX

Details
Discussion Comments: 0
Verification: Authors have not verified information

Finding the Critical Sampling of Big Datasets

José Silva, Bernardete Ribeiro, Andrew H. Sung

Finding the Critical Sampling of Big Datasets

Details
Discussion Comments: 0
Verification: Authors have not verified information

BC-AMAT: Considering Blocked Time in Memory System Measurement

Qi Yu, Libo Huang, Cheng Qian, Zhiying Wang

BC-AMAT: Considering Blocked Time in Memory System Measurement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Designing Scalable Distributed Memory Models: A Case Study

Joshua Landwehr, Joshua Suetterlein, Joseph B. Manzano, Andrès Márquez, Kevin J. Barker, Guang R. Gao

Designing Scalable Distributed Memory Models: A Case Study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Self-Sustainability in Nano Unmanned Aerial Vehicles: A Blimp Case Study

Daniele Palossi, Andres Gomez, Stefan Draskovic, Kevin Keller, Luca Benini, Lothar Thiele

Self-Sustainability in Nano Unmanned Aerial Vehicles: A Blimp Case Study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using Tweaks To Design Fault Resistant Ciphers (Full Version)

Sikhar Patranabis, Debapriya Basu Roy, Debdeep Mukhopadhyay

Using Tweaks To Design Fault Resistant Ciphers (Full Version)

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Learning the Energy Model of an MPSoC for Convex Optimization

Erwan Nogues, Daniel Ménard, Alexandre Mercat, Maxime Pelcat

On Learning the Energy Model of an MPSoC for Convex Optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Let's Go: a Data-Driven Multi-Threading Support

Alberto Scionti, Somnath Mazumdar

Let's Go: a Data-Driven Multi-Threading Support

Details
Discussion Comments: 0
Verification: Authors have not verified information

Work Stealing in a Shared Virtual-Memory Heterogeneous Environment: A Case Study with Betweenness Centrality

Shuai Che, Marc S. Orr, Jonathan Gallmeier

Work Stealing in a Shared Virtual-Memory Heterogeneous Environment: A Case Study with Betweenness Centrality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data Analytics with NVLink: An SpMV Case Study

Daniele Buono, Fausto Artico, Fabio Checconi, Jee W. Choi, Xinyu Que, Lars Schneidenbach

Data Analytics with NVLink: An SpMV Case Study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding the I/O Behavior of Desktop Applications in Virtualization

Yan Sui, Chun Yang, Xu Cheng

Understanding the I/O Behavior of Desktop Applications in Virtualization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring the Performance Limits of Out-of-order Commit

Mehdi Alipour, Trevor E. Carlson, Stefanos Kaxiras

Exploring the Performance Limits of Out-of-order Commit

Details
Discussion Comments: 0
Verification: Authors have not verified information

Finding Maximum Cliques on a Quantum Annealer

Guillaume Chapuis, Hristo Djidjev, Georg Hahn, Guillaume Rizk

Finding Maximum Cliques on a Quantum Annealer

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing memory affinity with a hybrid compiler/OS approach

Matthias Diener, Eduardo H. M. Cruz, Marco A. Z. Alves, Edson Borin, Philippe O. A. Navaux

Optimizing memory affinity with a hybrid compiler/OS approach

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

An Enhanced Image Reconstruction Tool for Computed Tomography on CPUs

Xiaodong Yu, Hao Wang, Wu-chun Feng, Hao Gong, Guohua Cao

An Enhanced Image Reconstruction Tool for Computed Tomography on CPUs

Details
Author Comments: The computing platform of this work is GPU rather than CPU.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

DYCE: A Resilient Shared Memory Paradigm for Heterogenous Distributed Systems without Memory Coherence

Ulrich Finkler, Hubertus Franke, David S. Kung

DYCE: A Resilient Shared Memory Paradigm for Heterogenous Distributed Systems without Memory Coherence

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cloud Workload Prediction by Means of Simulations

Gabor Kecskemeti, Attila Kertész, Zsolt Németh

Cloud Workload Prediction by Means of Simulations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Instruction level energy model for the Adapteva Epiphany multi-core processor

Gabriel Ortiz, Lars J. Svensson, Erik Alveflo, Per Larsson-Edefors

Instruction level energy model for the Adapteva Epiphany multi-core processor

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Big Data Visualization for Monitoring and Diagnostics of High Volume Semiconductor Manufacturing

Dimitra Gkorou, Alexander Ypma, George Tsirogiannis, Manuel Giollo, Dag Sonntag, Geert Vinken, Richard van Haren, Robert Jan van Wijk, Jelle Nije, Tom Hoogenboom

Towards Big Data Visualization for Monitoring and Diagnostics of High Volume Semiconductor Manufacturing

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Empirical Comparison of Stream Clustering Algorithms

Matthias Carnein, Dennis Assenmacher, Heike Trautmann

An Empirical Comparison of Stream Clustering Algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Recommending Resources to Cloud Applications based on Custom Templates Composition

Ronny Bazan Antequera, Prasad Calyam, Arjun Ankathatti Chandrashekara, Shivoam Malhotra

Recommending Resources to Cloud Applications based on Custom Templates Composition

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do we need a holistic approach for the design of secure IoT systems?

Mauro Conti, Giorgio Di Natale, Annelie Heuser, Thomas Pöppelmann, Nele Mentens

Do we need a holistic approach for the design of secure IoT systems?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Trading Fault Tolerance for Performance in AN Encoding

Norman A. Rink, Jerónimo Castrillón

Trading Fault Tolerance for Performance in AN Encoding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Design of S-boxes Defined with Cellular Automata Rules

Stjepan Picek, Luca Mariot, Bohan Yang, Domagoj Jakobovic, Nele Mentens

Design of S-boxes Defined with Cellular Automata Rules

Details
Discussion Comments: 0
Verification: Authors have not verified information

ExanaDBT: A Dynamic Compilation System for Transparent Polyhedral Optimizations at Runtime

Yukinori Sato, Tomoya Yuki, Toshio Endo

ExanaDBT: A Dynamic Compilation System for Transparent Polyhedral Optimizations at Runtime

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data mining the memory access stream to detect anomalous application behavior

Francis B. Moreira, Matthias Diener, Philippe O. A. Navaux, Israel Koren

Data mining the memory access stream to detect anomalous application behavior

Details
Discussion Comments: 0
Verification: Authors have not verified information

RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity

Jun Zhang, Rui Hou, Junfeng Fan, Ke Liu, Lixin Zhang, Sally A. McKee

RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity

Details
Author Comments: This work could be repeated by modifying the project of stack-guard (https://github.com/DhavalKapil/stack-guard)
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

BONSEYES: Platform for Open Development of Systems of Artificial Intelligence: Invited paper

Tim Llewellynn, M. del Milagro Fernández-Carrobles, Oscar Déniz, Samuel Fricker, Amos J. Storkey, Nuria Pazos, Gordana Velikic, Kirsten Leufgen, Rozenn Dahyot, Sebastian Koller, Georgios I. Goumas, Peter Leitner, Ganesh Dasika, Lei Wang, Kurt Tutschku

BONSEYES: Platform for Open Development of Systems of Artificial Intelligence: Invited paper

Details
Discussion Comments: 0
Verification: Authors have not verified information

Designing and Programming the Configurable Cloud

Andrew Putnam

Designing and Programming the Configurable Cloud

Details
Discussion Comments: 0
Verification: Author has not verified information

Advanced Manufacturing Collaboration in a Cloud-based App Marketplace

Amit Rama Akula, Prasad Calyam, Ronny Bazan Antequera, Raymond E. Leto

Advanced Manufacturing Collaboration in a Cloud-based App Marketplace

Details
Discussion Comments: 0
Verification: Authors have not verified information

High Performance Coordinate Descent Matrix Factorization for Recommender Systems

Xi Yang, Jianbin Fang, Jing Chen, Chengkun Wu, Tao Tang, Kai Lu

High Performance Coordinate Descent Matrix Factorization for Recommender Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Future of Deep Learning: Challenges & Solutions

Mark Robins

The Future of Deep Learning: Challenges & Solutions

Details
Discussion Comments: 0
Verification: Author has not verified information

ARM HPC Ecosystem and the Reemergence of Vectors: Invited Paper

Alejandro Rico, José A. Joao, Chris Adeniyi-Jones, Eric Van Hensbergen

ARM HPC Ecosystem and the Reemergence of Vectors: Invited Paper

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using Personality Metrics to Improve Cache Interference Management in Multicore Processors

Mwaffaq Otoom, Aamer Jaleel, Pedro Trancoso

Using Personality Metrics to Improve Cache Interference Management in Multicore Processors

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset

Xun Wei, Fan Jiang, Feng Wei, Jiekui Zhang, Weiwei Liao, Shaoyin Cheng

An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset

Details
Discussion Comments: 0
Verification: Authors have not verified information

Addressing Hadoop's Small File Problem With an Appendable Archive File Format

Thomas Renner, Johannes Müller, Lauritz Thamsen, Odej Kao

Addressing Hadoop's Small File Problem With an Appendable Archive File Format

Details
Discussion Comments: 0
Verification: Authors have not verified information

Peak load optimization through 2-dimensional packing and multi-processor real-time scheduling

Daniele De Martini, Guido Benetti, Filippo Cipolla, Davide Caprino, Marco L. Della Vedova, Tullio Facchinetti

Peak load optimization through 2-dimensional packing and multi-processor real-time scheduling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Task-parallel Runtime System Optimization Using Static Compiler Analysis

Peter Thoman, Peter Zangerl, Thomas Fahringer

Task-parallel Runtime System Optimization Using Static Compiler Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

CAROL-FI: an Efficient Fault-Injection Tool for Vulnerability Evaluation of Modern HPC Parallel Accelerators

Daniel A. G. de Oliveira, Vinicius Fratin, Philippe Olivier Alexandre Navaux, Israel Koren, Paolo Rech

CAROL-FI: an Efficient Fault-Injection Tool for Vulnerability Evaluation of Modern HPC Parallel Accelerators

Details
Discussion Comments: 0
Verification: Authors have not verified information

Designing Swarms of Cyber-Physical Systems: the H2020 CPSwarm Project: Invited Paper

Alessandra Bagnato, Regina Krisztina Bíró, Dario Bonino, Claudio Pastrone, Wilfried Elmenreich, René Reiners, Melanie Schranz, Edin Arnautovic

Designing Swarms of Cyber-Physical Systems: the H2020 CPSwarm Project: Invited Paper

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quality Optimization of Resilient Applications under Temperature Constraints

Heng Yu, Yajun Ha, Jing Wang

Quality Optimization of Resilient Applications under Temperature Constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

AXIOM project: from applied research towards embedded systems

Davide Catani

AXIOM project: from applied research towards embedded systems

Details
Discussion Comments: 0
Verification: Author has not verified information

GPU-UniCache: Automatic Code Generation of Spatial Blocking for Stencils on CPUs

Kaixi Hou, Hao Wang, Wu-chun Feng

GPU-UniCache: Automatic Code Generation of Spatial Blocking for Stencils on CPUs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Private inter-network routing for Wireless Sensor Networks and the Internet of Things

Paolo Palmieri, Luca Calderoni, Dario Maio

Private inter-network routing for Wireless Sensor Networks and the Internet of Things

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Selective off-loading to Memory: Task Partitioning and Mapping for PIM-enabled Heterogeneous Systems

Dawen Xu, Yi Liao, Ying Wang, Huawei Li, Xiaowei Li

Selective off-loading to Memory: Task Partitioning and Mapping for PIM-enabled Heterogeneous Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

DPA on hardware implementations of Ascon and Keyak

Niels Samwel, Joan Daemen

DPA on hardware implementations of Ascon and Keyak

Details
Discussion Comments: 0
Verification: Authors have not verified information

Brain-Inspired Memory Architecture for Sparse Nonlocal and Unstructured Workloads

Yasunao Katayama

Brain-Inspired Memory Architecture for Sparse Nonlocal and Unstructured Workloads

Details
Discussion Comments: 0
Verification: Author has not verified information

Sorting big data on heterogeneous near-data processing systems

Erik Vermij, Leandro Fiorin, Christoph Hagleitner, Koen Bertels

Sorting big data on heterogeneous near-data processing systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Large-Scale Plant Classification with Deep Neural Networks

Ignacio Heredia

Large-Scale Plant Classification with Deep Neural Networks

Details
Discussion Comments: 0
Verification: Author has not verified information

A Large-Scale Malleable Tsunami Simulation Realized on an Elastic MPI Infrastructure

Ao Mo-Hellenbrand, Isaías A. Comprés Ureña, Oliver Meister, Hans-Joachim Bungartz, Michael Gerndt, Michael Bader

A Large-Scale Malleable Tsunami Simulation Realized on an Elastic MPI Infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

Big Data Analytics on Large-Scale Scientific Datasets in the INDIGO-DataCloud Project

Sandro Fiore, Cosimo Palazzo, Alessandro D'Anca, Donatello Elia, Elisa Londero, Cristina Knapic, Stephen Monna, Nicola M. Marcucci, Fernando Aguilar, Marcin Plóciennik, Jesús E. Marco de Lucas, Giovanni Aloisio

Big Data Analytics on Large-Scale Scientific Datasets in the INDIGO-DataCloud Project

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving Error Resilience Analysis Methodology of Iterative Workloads for Approximate Computing

G. A. Gillani, André B. J. Kokkeler

Improving Error Resilience Analysis Methodology of Iterative Workloads for Approximate Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Vectorization of Hybrid Breadth First Search on the Intel Xeon Phi

Mireya Paredes, Graham D. Riley, Mikel Luján

Vectorization of Hybrid Breadth First Search on the Intel Xeon Phi

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal On-Line Computation of Stack Distances for MIN and OPT

Gianfranco Bilardi, Kattamuri Ekanadham, Pratap Pattnaik

Optimal On-Line Computation of Stack Distances for MIN and OPT

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Hardware Support for Secure Stream Processing in Cloud Environments

Jeff Anderson, Tarek A. El-Ghazawi

Hardware Support for Secure Stream Processing in Cloud Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Extending the comfort zone: DAVIDE

Fabrizio Magugliani

Extending the comfort zone: DAVIDE

Details
Discussion Comments: 0
Verification: Author has not verified information

Boda: A Holistic Approach for Implementing Neural Network Computations

Matthew W. Moskewicz, Ali Jannesari, Kurt Keutzer

Boda: A Holistic Approach for Implementing Neural Network Computations

Details
Discussion Comments: 0
Verification: Authors have not verified information