by Yao Fu, Luo Mai and Dmitrii Ustiugov on Feb 28, 2025 | Tags: Cloud computing, generative ai, machine learning systems, serverless ai, serverless computing
Artificial Intelligence (AI) is revolutionizing the world, powering productivity tools, healthcare, and education innovations through large-scale models like ChatGPT, DeepSeek, Gemini, and Claude. Most of these models, managed by tech giants such as OpenAI, Google,...
Read more...
by Akanksha Atrey, Sercan Aygun, Udit Gupta, Abdulrahman Mahmoud, Lillian Pentecost, Vijay Janapa Reddi on Jan 28, 2025 | Introduction The increasing complexity of machine learning systems demands a new approach to their design, optimization, and deployment. While tremendous progress has been made in ML algorithms and hardware acceleration, building reliable, efficient, and scalable ML...
Read more...
by Geraldo Oliveira, Juan Gómez-Luna, Onur Mutlu on Jan 22, 2025 | Tags: Emerging Technology, Memory, Processing-in-Memory
Processing-in-Memory (PIM) is a computing paradigm that aims to overcome the data movement bottleneck (i.e., wasted execution cycles and energy, resulting from the back-and-forth data movement between memory units and compute units) by making memory (and storage)...
Read more...
by Shvetank Prakash and Vijay Janapa Reddi on Jan 7, 2025 | Tags: AI Agents, Benchmarks, Datasets, Machine Learning
Introduction The rise of large language models (LLMs) and generative artificial intelligence (GenAI) presents new opportunities to build innovative tools and is already enabling revolutionary AI-based tools in various domains. However, a significant gap remains in the...
Read more...
by Irene Wang on Dec 23, 2024 | Tags: Conference, Mentoring, uarch, Workshop
The Undergraduate Architecture Mentoring (uArch) Workshop co-located with the International Symposium on Microarchitecture (MICRO) was hosted in Austin, Texas. This year marked a significant milestone, as uArch was held twice in the same calendar year – reflecting our...
Read more...
by Biswabandan Panda on Dec 11, 2024 | Tags: caches, Security
This blog post is a continuation of Gururaj’s SIGARCH blog, written three years ago. It revisits the design of secure caches and, primarily, two design choices available to the designers: partitioned cache and randomized cache. In the last three years,...
Read more...