| ASPLOS-2025 | A | 3 | 2025-11-04 14:09:49.654Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:09:17.444Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:08:45.402Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:08:13.177Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:07:41.008Z |
Debugger Toolchain Validation via Cross-Level DebuggingEnsuring the correctness of debugger toolchains is of paramount importance, as they play a vital role in understanding and resolving programming errors during software development. Bugs hidden within these toolchains can significantly mislead develop... | ASPLOS-2025 | A | 3 | 2025-11-04 14:07:08.858Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:06:36.757Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:06:04.738Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:05:32.369Z |
Cooperative Graceful Degradation in Containerized CloudsCloud resilience is crucial for cloud operators and the myriad of applications that rely on the cloud. Today, we lack a mechanism that enables cloud operators to perform graceful degradation of applications while satisfying the application's availabi... | ASPLOS-2025 | A | 3 | 2025-11-04 14:05:00.120Z |
| Explain icons... |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:04:27.906Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:03:55.536Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:03:23.448Z |
ClosureX:Compiler Support for Correct Persistent FuzzingFuzzing is a widely adopted and pragmatic methodology for bug hunting as a means of software hardening. Research reveals that increasing fuzzing throughput directly increases bug discovery rate. The highest performance fuzzing strategy is persistent ... | ASPLOS-2025 | A | 3 | 2025-11-04 14:02:51.157Z |
Cinnamon: A Framework for Scale-Out Encrypted AIFully homomorphic encryption (FHE) is a promising cryptographic solution that enables computation on encrypted data, but its adoption remains a challenge due to steep performance overheads. Although recent FHE architectures have made valiant efforts ... | ASPLOS-2025 | A | 3 | 2025-11-04 14:02:18.910Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:01:46.693Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:01:14.643Z |
Automatic Tracing in Task-Based Runtime SystemsImplicitly parallel task-based runtime systems often perform dynamic analysis to discover dependencies in and extract parallelism from sequential programs. Dependence analysis becomes expensive as task granularity drops below a threshold. Tracing ...... | ASPLOS-2025 | A | 3 | 2025-11-04 14:00:42.465Z |
| ASPLOS-2025 | A | 3 | 2025-11-04 14:00:10.401Z |
AnyKey: A Key-Value SSD for All Workload TypesKey- value solid-state drives (KV-SSDs) are considered as a potential storage solution for large-scale key-value (KV) store applications. Unfortunately, the existing KV-SSD designs are tuned for a specific type of workload, namely, those in which the... | ASPLOS-2025 | A | 3 | 2025-11-04 13:59:38.354Z |
AnA: An Attentive Autonomous Driving SystemIn an autonomous driving system (ADS), the perception module is crucial to driving safety and efficiency. Unfortunately, the perception in today's ADS remains oblivious to driving decisions, contrasting to how humans drive. Our idea is to refactor AD... | ASPLOS-2025 | A | 3 | 2025-11-04 13:59:06.282Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:11:44.958Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:11:12.938Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:10:40.588Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:10:08.425Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:09:36.450Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:09:04.265Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:08:32.076Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:07:59.730Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:07:27.214Z |
Reconfigurable Stream Network ArchitectureAs AI systems grow increasingly specialized and complex, managing hardware heterogeneity becomes a pressing challenge. How can we efficiently coordinate and synchronize heterogeneous hardware resources to achieve high utilization? How can we minimize... | ISCA-2025 | A | 3 | 2025-11-04 06:06:55.187Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:06:23.183Z |
MagiCache: A Virtual In-Cache Computing EngineThe rise of data-parallel applications poses a significant challenge to the energy consumption of computing architectures. In-cache computation is a promising solution for achieving high parallelism and energy efficiency because it can eliminate data... | ISCA-2025 | A | 3 | 2025-11-04 06:05:51.009Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:05:18.986Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:04:46.996Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:04:14.602Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:03:42.308Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:03:10.251Z |
| ISCA-2025 | A | 3 | 2025-11-04 06:02:38.074Z |
DX100: Programmable Data Access Accelerator for IndirectionIndirect memory accesses frequently appear in applications where memory bandwidth is a critical bottleneck. Prior indirect memory access proposals, such as indirect prefetchers, runahead execution, fetchers, and decoupled access/execute architectures... | ISCA-2025 | A | 3 | 2025-11-04 06:02:06.035Z |