Localization and mapping is a key technology for bridging the virtual an...
Homomorphic encryption (HE) is a privacy-preserving technique that enabl...
Implementing image processing algorithms using FPGAs or ASICs can improv...
As autonomous driving and augmented reality evolve, a practical concern ...
Users are demanding increased data security. As a result, security is ra...
Compression and efficient storage of neural network (NN) parameters is
c...
Homomorphic encryption (HE) is a privacy-preserving technique that enabl...
When a computational task tolerates a relaxation of its specification or...
Stochastic computing (SC) is an emerging computing technique that promis...
- The primary author has withdrawn this paper due to conflict of interes...
Cameras are the defacto sensor. The growing demand for real-time and
low...
Recent advances in neural networks (NNs) exhibit unprecedented success a...
Similarity search is a key to a variety of applications including
conten...