{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:48:20Z","timestamp":1773193700156,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCRI-2016727, CNS-1942219, CNS-1801884"],"award-info":[{"award-number":["CCRI-2016727, CNS-1942219, CNS-1801884"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1145\/3458336.3465288","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T02:03:56Z","timestamp":1622772236000},"page":"175-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Toward reconfigurable kernel datapaths with learned optimizations"],"prefix":"10.1145","author":[{"given":"Yiming","family":"Qiu","sequence":"first","affiliation":[{"name":"Rice University"}]},{"given":"Hongyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Thomas","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Yingyan","family":"Lin","sequence":"additional","affiliation":[{"name":"Rice University"}]},{"given":"Ang","family":"Chen","sequence":"additional","affiliation":[{"name":"Rice University"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Digitalisation and Energy. https:\/\/www.iea.org\/reports\/digitalisation-and-energy.  Digitalisation and Energy. https:\/\/www.iea.org\/reports\/digitalisation-and-energy."},{"key":"e_1_3_2_1_2_1","unstructured":"The DARPA Real-Time Machine Learning Program. https:\/\/www.darpa.mil\/program\/real-time-machine-learning.  The DARPA Real-Time Machine Learning Program. https:\/\/www.darpa.mil\/program\/real-time-machine-learning."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2015.04.001"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. ATC","author":"Al Maruf H.","year":"2020","unstructured":"H. Al Maruf and M. Chowdhury . Effectively prefetching remote memory with leap . In Proc. ATC , 2020 . H. Al Maruf and M. Chowdhury. Effectively prefetching remote memory with leap. In Proc. ATC, 2020."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277355.3277365"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3102987"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629579"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2503308.2188395"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224077"},{"key":"e_1_3_2_1_11_1","volume-title":"Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248","author":"Brendel W.","year":"2017","unstructured":"W. Brendel , J. Rauber , and M. Bethge . Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248 , 2017 . W. Brendel, J. Rauber, and M. Bethge. Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. arXiv preprint arXiv:1712.04248, 2017."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/574462"},{"key":"e_1_3_2_1_13_1","volume-title":"Dbos: A proposal for a data-centric operating system. arXiv preprint arXiv:2007.11112","author":"Cafarella M.","year":"2020","unstructured":"M. Cafarella , D. DeWitt , V. Gadepally , J. Kepner , C. Kozyrakis , T. Kraska , M. Stonebraker , and M. Zaharia . Dbos: A proposal for a data-centric operating system. arXiv preprint arXiv:2007.11112 , 2020 . M. Cafarella, D. DeWitt, V. Gadepally, J. Kepner, C. Kozyrakis, T. Kraska, M. Stonebraker, and M. Zaharia. Dbos: A proposal for a data-centric operating system. arXiv preprint arXiv:2007.11112, 2020."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409963.3410492"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327546.3327548"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. IJCAI","author":"Coppens Y.","year":"2019","unstructured":"Y. Coppens , K. Efthymiadis , T. Lenaerts , and A. Nowe . Distilling deep reinforcement learning policies in soft decision trees . In Proc. IJCAI , 2019 . Y. Coppens, K. Efthymiadis, T. Lenaerts, and A. Nowe. Distilling deep reinforcement learning policies in soft decision trees. In Proc. IJCAI, 2019."},{"key":"e_1_3_2_1_17_1","volume-title":"Binarized neural networks: Training deep neural networks with weights and activations constrained to +1 or -1. arXiv:1602.02830","author":"Courbariaux M.","year":"2016","unstructured":"M. Courbariaux , I. Hubara , D. Soudry , R. El-Yaniv , and Y. Bengio . Binarized neural networks: Training deep neural networks with weights and activations constrained to +1 or -1. arXiv:1602.02830 , 2016 . M. Courbariaux, I. Hubara, D. Soudry, R. El-Yaniv, and Y. Bengio. Binarized neural networks: Training deep neural networks with weights and activations constrained to +1 or -1. arXiv:1602.02830, 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224076"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. ICML","author":"Finn C.","year":"2019","unstructured":"C. Finn , A. Rajeswaran , S. Kakade , and S. Levine . Online meta-learning . In Proc. ICML , 2019 . C. Finn, A. Rajeswaran, S. Kakade, and S. Levine. Online meta-learning. In Proc. ICML, 2019."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314590"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339809"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045303"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. OSDI","author":"Hao M.","year":"2020","unstructured":"M. Hao , L. Toksoz , N. Li , E. E. Halim , H. Hoffmann , and H. S. Gunawi . Linnos: Predictability on unpredictable flash storage (with a light neural network) . In Proc. OSDI , 2020 . M. Hao, L. Toksoz, N. Li, E. E. Halim, H. Hoffmann, and H. S. Gunawi. Linnos: Predictability on unpredictable flash storage (with a light neural network). In Proc. OSDI, 2020."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043564"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330648"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872887.2750392"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_29"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. ICLR","author":"Li C.","year":"2021","unstructured":"C. Li , Z. Yu , Y. Fu , Y. Zhang , Y. Zhao , H. You , Q. Yu , Y. Wang , C. Hao , and Y. Lin . Hw-nas-bench: Hardware-aware neural architecture search benchmark . In Proc. ICLR , 2021 . C. Li, Z. Yu, Y. Fu, Y. Zhang, Y. Zhao, H. You, Q. Yu, Y. Wang, C. Hao, and Y. Lin. Hw-nas-bench: Hardware-aware neural architecture search benchmark. In Proc. ICLR, 2021."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136625"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00017"},{"key":"e_1_3_2_1_35_1","volume-title":"Darts: Differentiable architecture search. arXiv preprint arXiv:1806.09055","author":"Liu H.","year":"2018","unstructured":"H. Liu , K. Simonyan , and Y. Yang . Darts: Differentiable architecture search. arXiv preprint arXiv:1806.09055 , 2018 . H. Liu, K. Simonyan, and Y. Yang. Darts: Differentiable architecture search. arXiv preprint arXiv:1806.09055, 2018."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001179"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210337"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"M. Maas. A taxonomy of ML for systems problems. IEEE Micro 40(5) 2020.  M. Maas. A taxonomy of ML for systems problems. IEEE Micro 40(5) 2020.","DOI":"10.1109\/MM.2020.3012883"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378525"},{"key":"e_1_3_2_1_40_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry A.","year":"2017","unstructured":"A. Madry , A. Makelov , L. Schmidt , D. Tsipras , and A. Vladu . Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 , 2017 . A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083, 2017."},{"key":"e_1_3_2_1_41_1","volume-title":"Proc. ICLR","author":"Molchanov P.","year":"2017","unstructured":"P. Molchanov , S. Tyree , T. Karras , T. Aila , and J. Kautz . Pruning convolutional neural networks for resource efficient inference . In Proc. ICLR , 2017 . P. Molchanov, S. Tyree, T. Karras, T. Aila, and J. Kautz. Pruning convolutional neural networks for resource efficient inference. In Proc. ICLR, 2017."},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. OSDI","author":"Nelson L.","year":"2020","unstructured":"L. Nelson , J. V. Geffen , E. Torlak , and X. Wang . Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel . In Proc. OSDI , 2020 . L. Nelson, J. V. Geffen, E. Torlak, and X. Wang. Specification and verification in the field: Applying formal methods to BPF just-in-time compilers in the Linux kernel. In Proc. OSDI, 2020."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3102998"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. DeepTest","author":"Pei K.","year":"2019","unstructured":"K. Pei , Y. Cao , J. Yang , and S. Jana . Towards practical verification of machine learning: The case of computer vision systems . In Proc. DeepTest , 2019 . K. Pei, Y. Cao, J. Yang, and S. Jana. Towards practical verification of machine learning: The case of computer vision systems. In Proc. DeepTest, 2019."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1457515.1409106"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"e_1_3_2_1_47_1","volume-title":"Efficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946","author":"Tan M.","year":"2019","unstructured":"M. Tan and Q. V. Le . Efficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946 , 2019 . M. Tan and Q. V. Le. Efficientnet: Rethinking model scaling for convolutional neural networks. arXiv preprint arXiv:1905.11946, 2019."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00041"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371038"},{"key":"e_1_3_2_1_50_1","volume-title":"Niti: Training integer neural networks using integer-only arithmetic. arXiv preprint arXiv:2009.13108","author":"Wang M.","year":"2020","unstructured":"M. Wang , S. Rasoulinezhad , P. H. Leong , and H. K. So . Niti: Training integer neural networks using integer-only arithmetic. arXiv preprint arXiv:2009.13108 , 2020 . M. Wang, S. Rasoulinezhad, P. H. Leong, and H. K. So. Niti: Training integer neural networks using integer-only arithmetic. arXiv preprint arXiv:2009.13108, 2020."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486403"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1816609"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.643"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352020.3352027"}],"event":{"name":"HotOS '21: Workshop on Hot Topics in Operating Systems","location":"Ann Arbor Michigan","acronym":"HotOS '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Workshop on Hot Topics in Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458336.3465288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458336.3465288","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3458336.3465288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:19Z","timestamp":1750195699000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3458336.3465288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":53,"alternative-id":["10.1145\/3458336.3465288","10.1145\/3458336"],"URL":"https:\/\/doi.org\/10.1145\/3458336.3465288","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}