- Remote Sensing and LiDAR Applications
- Data Visualization and Analytics
- Computer Graphics and Visualization Techniques
- Parallel Computing and Optimization Techniques
- Coding theory and cryptography
- Radiation Effects in Electronics
- Quantum Computing Algorithms and Architecture
- Air Traffic Management and Optimization
- Cryptography and Data Security
- Security and Verification in Computing
- Data Management and Algorithms
Alibaba Group (China)
2020-2023
East China Normal University
2019-2020
The open source RISC-V ISA has been quickly gaining momentum. This paper presents Xuantie-910, an industry leading 64-bit high performance embedded processor from Alibaba T-Head division. It is fully based on the RV64GCV instruction set and it features custom extensions to arithmetic operation, bit manipulation, load store, TLB cache operations. also implements 0.7.1 stable release of RISCV vector extension specification for efficiency processing. Xuantie-910 supports multi-core...
This article consists only of a collection slides from the author's conference presentation.
The density map is widely used for data sampling, time-varying detection, ensemble representation, etc. visualization of dynamic evolution a challenging task when exploring spatiotemporal data. Many approaches have been provided to explore the variation patterns over time, which commonly need multiple parameters and preprocessing works. Image generation well-known topic in deep learning, variety generating models promoted recent years. In this paper, we introduce general pipeline called...
The propagation of flight delays is challenging to analyze because delay events depend on multiple variables. This phenomenon has become even worse with the increasing number aircraft in China, and research into shown limited progress. In this paper, we design a visual analysis system for propagation. Unlike conventional research, work focuses trends one region representing relationship occurring airports. First, construct Bayesian network parameters select factors visualization. Second,...
We present a cryptography extension built on RISC-V Vector Extension for efficient application of lattice-based post-quantum cryptography, offering custom instructions that can perform vectorized operations polynomials variable length and data width. use micro-operation architecture to simplify the execution variable-latency vector propose fracturable modular arithmetic units support coefficient On this basis, unit is designed, achieving significant speed-up compared state-of-the-art...