Picture for Rainer Leupers

Rainer Leupers

Optimizing Binary and Ternary Neural Network Inference on RRAM Crossbars using CIM-Explorer

Add code
May 20, 2025
Viaarxiv icon

Introducing Instruction-Accurate Simulators for Performance Estimation of Autotuning Workloads

Add code
May 19, 2025
Viaarxiv icon

Evaluating the Scalability of Binary and Ternary CNN Workloads on RRAM-based Compute-in-Memory Accelerators

Add code
May 12, 2025
Viaarxiv icon

A Calibratable Model for Fast Energy Estimation of MVM Operations on RRAM Crossbars

Add code
May 07, 2024
Figure 1 for A Calibratable Model for Fast Energy Estimation of MVM Operations on RRAM Crossbars
Figure 2 for A Calibratable Model for Fast Energy Estimation of MVM Operations on RRAM Crossbars
Figure 3 for A Calibratable Model for Fast Energy Estimation of MVM Operations on RRAM Crossbars
Figure 4 for A Calibratable Model for Fast Energy Estimation of MVM Operations on RRAM Crossbars
Viaarxiv icon

CLSA-CIM: A Cross-Layer Scheduling Approach for Computing-in-Memory Architectures

Add code
Jan 17, 2024
Viaarxiv icon

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

Add code
Jul 21, 2021
Figure 1 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Figure 2 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Figure 3 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Figure 4 for Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities
Viaarxiv icon

Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

Add code
Jul 19, 2021
Figure 1 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Figure 2 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Figure 3 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Figure 4 for Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks
Viaarxiv icon

Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach

Add code
Nov 30, 2020
Figure 1 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Figure 2 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Figure 3 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Figure 4 for Challenging the Security of Logic Locking Schemes in the Era of Deep Learning: A Neuroevolutionary Approach
Viaarxiv icon

Dataflow Aware Mapping of Convolutional Neural Networks Onto Many-Core Platforms With Network-on-Chip Interconnect

Add code
Jun 18, 2020
Figure 1 for Dataflow Aware Mapping of Convolutional Neural Networks Onto Many-Core Platforms With Network-on-Chip Interconnect
Figure 2 for Dataflow Aware Mapping of Convolutional Neural Networks Onto Many-Core Platforms With Network-on-Chip Interconnect
Figure 3 for Dataflow Aware Mapping of Convolutional Neural Networks Onto Many-Core Platforms With Network-on-Chip Interconnect
Figure 4 for Dataflow Aware Mapping of Convolutional Neural Networks Onto Many-Core Platforms With Network-on-Chip Interconnect
Viaarxiv icon

An Application-Specific VLIW Processor with Vector Instruction Set for CNN Acceleration

Add code
Apr 10, 2019
Figure 1 for An Application-Specific VLIW Processor with Vector Instruction Set for CNN Acceleration
Figure 2 for An Application-Specific VLIW Processor with Vector Instruction Set for CNN Acceleration
Figure 3 for An Application-Specific VLIW Processor with Vector Instruction Set for CNN Acceleration
Figure 4 for An Application-Specific VLIW Processor with Vector Instruction Set for CNN Acceleration
Viaarxiv icon