Qi Guo

ORCID: 0000-0003-2530-5874
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Parallel Computing and Optimization Techniques
  • Embedded Systems Design Techniques
  • Advanced Neural Network Applications
  • Advanced Memory and Neural Computing
  • Access Control and Trust
  • Advanced Data Storage Technologies
  • Cryptography and Data Security
  • Interconnection Networks and Systems
  • VLSI and Analog Circuit Testing
  • Data Management and Algorithms
  • Ferroelectric and Negative Capacitance Devices
  • Cloud Computing and Resource Management
  • Advanced Image and Video Retrieval Techniques
  • CCD and CMOS Imaging Sensors
  • Adversarial Robustness in Machine Learning
  • Arsenic contamination and mitigation
  • Image Retrieval and Classification Techniques
  • Multi-Agent Systems and Negotiation
  • Augmented Reality Applications
  • Heavy metals in environment
  • VLSI and FPGA Design Techniques
  • Heavy Metal Exposure and Toxicity
  • Semiconductor materials and devices
  • Internet Traffic Analysis and Secure E-voting
  • Distributed systems and fault tolerance

Chinese Academy of Sciences
2014-2025

Institute of Computing Technology
2016-2025

Xinjiang Technical Institute of Physics & Chemistry
2015-2024

Xinjiang University
2024

First Affiliated Hospital of Zhengzhou University
2024

Tsinghua University
2024

Brigham Young University
2023

Changchun Institute of Technology
2021

Minzu University of China
2021

Dalian University of Technology
2020

Neural networks (NNs) have been demonstrated to be useful in a broad range of applications such as image recognition, automatic translation and advertisement recommendation. State-of-the-art NNs are known both computationally memory intensive, due the ever-increasing deep structure, i.e., multiple layers with massive neurons connections (i.e., synapses). Sparse neural emerged an effective solution reduce amount computation required. Though existing NN accelerators able efficiently process...

10.5555/3195638.3195662 article EN 2016-10-15

Devising a complete and correct set of roles has been recognized as one the most important challenging tasks in implementing role based access control. A key problem related to this is notion goodness/interestingness -- when good/interesting? In paper, we define mining (RMP) discovering an optimal from existing user permissions. The main contribution paper formally RMP, analyze its theoretical bounds. addition above basic introduce two different variations called δ-approx RMP Minimal Noise...

10.1145/1266840.1266870 article EN 2007-06-20

Devising a complete and correct set of roles has been recognized as one the most important challenging tasks in implementing role based access control. A key problem related to this is notion goodness - when good? Recently, mining (RMP) defined discovering an optimal from existing user permissions. Several different objectives for optimality have proposed. However, with these definitions that often organizations already deployed wish optimize set. Even if discovered, widely different, it...

10.1145/1377836.1377839 article EN 2008-06-10

Multiple myeloma (MM) is the second most common haematological malignancy in UK. We present a case series of three patients with light chain only who had normal serum protein electrophoretic studies at screening and were diagnosed using urine free assessment. This reiterates importance thorough robust for MM presenting renal disease. review up to date literature we highlight need screen combination electrophoresis/immunofixation either urinary or measurement maintain high index suspicion...

10.2967/jnumed.109.063800 article EN Journal of Nuclear Medicine 2009-09-16

Devising a complete and correct set of roles has been recognized as one the most important challenging tasks in implementing role-based access control. A key problem related to this is notion goodness/interestingness—when role good/interesting? In article, we define Role Mining Problem (RMP) discovering an optimal from existing user permissions. The main contribution article formally RMP analyze its theoretical bounds. addition above basic RMP, introduce two different variations called...

10.1145/1805974.1805983 article EN ACM Transactions on Information and System Security 2010-07-01

Due to the "curse of dimensionality" problem, it is very expensive process nearest neighbor (NN) query in high-dimensional spaces; and hence, approximate approaches, such as Locality-Sensitive Hashing (LSH), are widely used for their theoretical guarantees empirical performance. Current LSH-based approaches target at L1 L2 spaces, while shown previous work, fractional distance metrics (Lp with 0 < p 1) can provide more insightful results than usual data mining multimedia applications....

10.1145/2882903.2882930 article EN Proceedings of the 2022 International Conference on Management of Data 2016-06-16

Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of hierarchy is a well understood concept that allows senior roles inherit permissions corresponding junior roles. further ease burden security administration, as there no need explicitly specify and maintain large number permissions. Given set or user permissions, one may construct alternative hierarchies. However, does not exist an optimal hierarchy. Optimality helps in maximizing benefit employing...

10.1109/acsac.2008.38 article EN 2008-12-01

Today, role-based access control (RBAC) has become a well-accepted paradigm for implementing because of its convenience and ease administration. However, in order to realize the full benefits RBAC paradigm, one must first define roles accurately. This task defining associating permissions with them, also known as role engineering, is typically accomplished either top-down or bottom-up manner. Under approach, careful analysis business processes done job functions then specify appropriate from...

10.1109/tdsc.2008.61 article EN IEEE Transactions on Dependable and Secure Computing 2008-11-12

Deep Learning Accelerators (DLAs) are effective to improve both performance and energy efficiency of compute-intensive deep learning algorithms. A flexible portable mean exploit DLAs is using high-performance software libraries with well-established APIs, which typically either manually implemented or automatically generated by exploration-based compilation approaches. Though approaches significantly reduce programming efforts, they fail find optimal near-optimal programs from a large but...

10.1145/3582016.3582061 article EN 2023-03-20

Graph neural networks (GNNs), which extend traditional for processing graph-structured data, have been widely used in many fields. The GNN computation mainly consists of the <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">edge processing</i> to generate messages by combining edge/vertex features and xmlns:xlink="http://www.w3.org/1999/xlink">vertex update vertex with aggregated messages. In addition nontrivial vector operations edge...

10.1109/tcad.2021.3052138 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2021-02-25

Sampling-based methods, such as SimPoint, are widely used for efficient pre-silicon \mu Arch evaluations, where the costs number of simulation points multiplied by evaluated designs. However, these keep growing with an increasing and expanding design space. Although techniques have been developed to accelerate space exploration, less attention has given further reducing budget each evaluation. Common strategies like coverage or sampling fewer typically compromise estimation accuracy....

10.1145/3727637 article EN ACM Transactions on Architecture and Code Optimization 2025-04-01

Because of its ease administration, role-based access control (RBAC) has become the norm to enforcing security in most today's organizations. For implementing RBAC, it is important devise a complete and correct set roles. This task, known

10.3233/jcs-2009-0341 article EN Journal of Computer Security 2009-03-24

During the design of a microprocessor, Design Space Exploration (DSE) is critical step which determines appropriate configuration microprocessor. In computer architecture community, supervised learning techniques have been applied to DSE build models for predicting qualities configurations. For learning, however, considerable simulation costs are required attaining labeled Given limited resources, it difficult achieve high accuracy. this paper, inspired by recent advances in semi-supervised...

10.5591/978-1-57735-516-8/ijcai11-281 article EN 2011-07-16

Ever-increasing design complexity and advances of technology impose great challenges on the modern microprocessors. One such challenge is to determine promising microprocessor configurations meet specific constraints, which called Design Space Exploration (DSE). In computer architecture community, supervised learning techniques have been applied DSE build regression models for predicting qualities configurations. For learning, however, considerable simulation costs are required attaining...

10.1145/2542182.2542202 article EN ACM Transactions on Intelligent Systems and Technology 2013-12-01

As a fundamental task in computer architecture research, performance comparison has been continuously hampered by the variability of performance. In traditional comparisons, impact is usually ignored (i.e., means observations are compared regardless variability), or few cases directly addressed with <inline-formula><tex-math>$t$</tex-math></inline-formula> -statistics without checking number and normality observations. this paper, we formulate as statistical task, empirically illustrate why...

10.1109/tc.2014.2315614 article EN IEEE Transactions on Computers 2014-04-04

In this talk, we present the overall system design and architecture, challenges encountered in practice, lessons learned from production deployment of talent search recommendation systems at LinkedIn. By presenting our experiences applying techniques intersection recommender systems, information retrieval, machine learning, statistical modeling a large-scale industrial setting highlighting open problems, hope to stimulate further research collaborations within SIGIR community.

10.1145/3209978.3210205 article EN 2018-06-27
Coming Soon ...