iterative distributed operation |
3 |
key dependency |
3 |
partitioning |
3 |
shuffle |
3 |
spark |
3 |
3d printing |
2 |
big-data |
2 |
channel label |
2 |
cognitive radio network |
2 |
conflicting area |
2 |
data-intensive scalable computing system |
2 |
delays |
2 |
distributed transaction |
2 |
edge computing |
2 |
fault tolerance |
2 |
gpu |
2 |
identifier |
2 |
information flow tracking |
2 |
local information |
2 |
machine learning |
2 |
multi-head slicing |
2 |
network function virtualization |
2 |
noise measurement |
2 |
non-conflicting area |
2 |
remote direct memory access |
2 |
rendezvous algorithms |
2 |
resilience |
2 |
runtime |
2 |
scalability |
2 |
software reliability |
2 |
state machine replication |
2 |
taillatency |
2 |
3d parallelism |
1 |
accelerator |
1 |
amd sev |
1 |
arm trustzone |
1 |
big data workflow |
1 |
client-server systems |
1 |
concurrency attack |
1 |
consensus protocol |
1 |
constraint solving |
1 |
control-flow analysis |
1 |
convergence |
1 |
data-flow analysis |
1 |
deep learning |
1 |
deep learning testing |
1 |
deterministic multithreading |
1 |
distributed inference |
1 |
distributed networks |
1 |
distributed system |
1 |
distributed system and network |
1 |
distributed training |
1 |
dnn |
1 |
energy efficient |
1 |
error detection |
1 |
fault isolation |
1 |
flexible printed circuits |
1 |
heterogeneous cloud |
1 |
intel sgx |
1 |
model interpretation |
1 |
multithreading |
1 |
network topology |
1 |
network-level security and protection |
1 |
neuron sensitivity |
1 |
nondeterminism |
1 |
overlay networks |
1 |
parallel programs |
1 |
path slicing |
1 |
peer-to-peer computing |
1 |
pipeline parallelism |
1 |
program simplification |
1 |
program slicing |
1 |
reliability |
1 |
robotic iot |
1 |
robust |
1 |
robustness |
1 |
security isolation |
1 |
sensitivity |
1 |
software model checking |
1 |
software testing |
1 |
source code (software) |
1 |
sparks |
1 |
specialization |
1 |
stable and deterministic multithreading |
1 |
stable multithreading |
1 |
state space reduction |
1 |
static analysis |
1 |
storage management |
1 |
symbolic execution |
1 |
systems rules |
1 |
throughput |
1 |
training throughput |
1 |
trusted computing |
1 |
trusted execution environment |
1 |
verification |
1 |
virtual machines |
1 |
virtualisation |
1 |
wireless networks |
1 |