{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:11:22Z","timestamp":1760044282230,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1145\/3559009.3569673","type":"proceedings-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T14:02:50Z","timestamp":1674828170000},"page":"291-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Q-gym"],"prefix":"10.1145","author":[{"given":"Cheng","family":"Fu","sequence":"first","affiliation":[{"name":"UC San Diego"}]},{"given":"Hanxian","family":"Huang","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"Bram","family":"Wasti","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Chris","family":"Cummins","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Riyadh","family":"Baghdadi","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Kim","family":"Hazelwood","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Yuandong","family":"Tian","sequence":"additional","affiliation":[{"name":"Meta AI"}]},{"given":"Jishen","family":"Zhao","sequence":"additional","affiliation":[{"name":"UC San Diego"}]},{"given":"Hugh","family":"Leather","sequence":"additional","affiliation":[{"name":"Meta AI"}]}],"member":"320","published-online":{"date-parts":[[2023,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Gurobi Optimization - The Fastest Solver. https:\/\/www.gurobi.com  [n.d.]. Gurobi Optimization - The Fastest Solver. https:\/\/www.gurobi.com"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. oneAPI Deep Neural Network Library (oneDNN). https:\/\/github.com\/oneapi-src\/oneDNN  [n.d.]. oneAPI Deep Neural Network Library (oneDNN). https:\/\/github.com\/oneapi-src\/oneDNN"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. OneDNN Performance Profiling Tool. https:\/\/github.com\/oneapi-src\/oneDNN\/blob\/master\/examples\/performance_profiling.cpp  [n.d.]. OneDNN Performance Profiling Tool. https:\/\/github.com\/oneapi-src\/oneDNN\/blob\/master\/examples\/performance_profiling.cpp"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. HELib. Online: https:\/\/github.com\/homenc\/HElib.EPFL-LDS.  2021. HELib. Online: https:\/\/github.com\/homenc\/HElib.EPFL-LDS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNI.2017.8123782"},{"key":"e_1_3_2_1_6_1","volume-title":"Proxquant: Quantized neural networks via proximal operators. arXiv preprint arXiv:1810.00861","author":"Bai Yu","year":"2018","unstructured":"Yu Bai , Yu-Xiang Wang , and Edo Liberty . 2018 . Proxquant: Quantized neural networks via proximal operators. arXiv preprint arXiv:1810.00861 (2018). Yu Bai, Yu-Xiang Wang, and Edo Liberty. 2018. Proxquant: Quantized neural networks via proximal operators. arXiv preprint arXiv:1810.00861 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.574"},{"key":"e_1_3_2_1_12_1","volume-title":"TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Chen Tianqi","year":"2018","unstructured":"Tianqi Chen , Thierry Moreau , Ziheng Jiang , Lianmin Zheng , Eddie Yan , Haichen Shen , Meghan Cowan , Leyuan Wang , Yuwei Hu , Luis Ceze , Carlos Guestrin , and Arvind Krishnamurthy . 2018 . TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18) . USENIX Association, Carlsbad, CA, 578--594. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/chen Tianqi Chen, Thierry Moreau, Ziheng Jiang, Lianmin Zheng, Eddie Yan, Haichen Shen, Meghan Cowan, Leyuan Wang, Yuwei Hu, Luis Ceze, Carlos Guestrin, and Arvind Krishnamurthy. 2018. TVM: An Automated End-to-End Optimizing Compiler for Deep Learning. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association, Carlsbad, CA, 578--594. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/chen"},{"key":"e_1_3_2_1_13_1","volume-title":"Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. CoRR abs\/1811.09953","author":"Chou Edward","year":"2018","unstructured":"Edward Chou , Josh Beal , Daniel Levy , Serena Yeung , Albert Haque , and Li Fei-Fei . 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. CoRR abs\/1811.09953 ( 2018 ). arXiv:1811.09953 http:\/\/arxiv.org\/abs\/1811.09953 Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, and Li Fei-Fei. 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. CoRR abs\/1811.09953 (2018). arXiv:1811.09953 http:\/\/arxiv.org\/abs\/1811.09953"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066100.1066102"},{"key":"e_1_3_2_1_16_1","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat practical fully homomorphic encryption . IACR Cryptol. ePrint Arch. 2012 (2012), 144 . Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2012 (2012), 144.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_17_1","first-page":"110","article-title":"Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs","volume":"93","author":"Agner Fog","year":"2011","unstructured":"Agner Fog et al. 2011 . Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs . Copenhagen University College of Engineering 93 (2011), 110 . Agner Fog et al. 2011. Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs. Copenhagen University College of Engineering 93 (2011), 110.","journal-title":"Copenhagen University College of Engineering"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_19_1","volume-title":"International Conference on Machine Learning. PMLR, 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In International Conference on Machine Learning. PMLR, 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. PMLR, 201--210."},{"key":"e_1_3_2_1_20_1","volume-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149","author":"Han Song","year":"2015","unstructured":"Song Han , Huizi Mao , and William J Dally . 2015. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149 ( 2015 ). Song Han, Huizi Mao, and William J Dally. 2015. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149 (2015)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00062"},{"key":"e_1_3_2_1_23_1","volume-title":"Network Trimming: A Data-Driven Neuron Pruning Approach towards Efficient Deep Architectures. CoRR abs\/1607.03250","author":"Hu Hengyuan","year":"2016","unstructured":"Hengyuan Hu , Rui Peng , Yu-Wing Tai , and Chi-Keung Tang . 2016 . Network Trimming: A Data-Driven Neuron Pruning Approach towards Efficient Deep Architectures. CoRR abs\/1607.03250 (2016). arXiv:1607.03250 http:\/\/arxiv.org\/abs\/1607.03250 Hengyuan Hu, Rui Peng, Yu-Wing Tai, and Chi-Keung Tang. 2016. Network Trimming: A Data-Driven Neuron Pruning Approach towards Efficient Deep Architectures. CoRR abs\/1607.03250 (2016). arXiv:1607.03250 http:\/\/arxiv.org\/abs\/1607.03250"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00448"},{"volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 1651--1669.","author":"Juvekar Chiraag","key":"e_1_3_2_1_25_1","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018. {GAZELLE} : A low latency framework for secure neural network inference . In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1651--1669. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. {GAZELLE}: A low latency framework for secure neural network inference. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 1651--1669."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3497776.3517781"},{"key":"e_1_3_2_1_28_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. [n.d.]. CIFAR-10 (Canadian Institute for Advanced Research). ([n. d.]). http:\/\/www.cs.toronto.edu\/~kriz\/cifar.html  Alex Krizhevsky Vinod Nair and Geoffrey Hinton. [n.d.]. CIFAR-10 (Canadian Institute for Advanced Research). ([n. d.]). http:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"e_1_3_2_1_29_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. [n.d.]. CIFAR-100 (Canadian Institute for Advanced Research). ([n. d.]). http:\/\/www.cs.toronto.edu\/~kriz\/cifar.html  Alex Krizhevsky Vinod Nair and Geoffrey Hinton. [n.d.]. CIFAR-100 (Canadian Institute for Advanced Research). ([n. d.]). http:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"e_1_3_2_1_30_1","unstructured":"imagenet Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105.  imagenet Alex Krizhevsky Ilya Sutskever and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097--1105."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.435"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_2_1_34_1","volume-title":"She: A fast and accurate deep neural network for encrypted data. Neural Information Processing Systems","author":"Lou Qian","year":"2019","unstructured":"Qian Lou and Lei Jiang . 2019 . She: A fast and accurate deep neural network for encrypted data. Neural Information Processing Systems (2019). Qian Lou and Lei Jiang. 2019. She: A fast and accurate deep neural network for encrypted data. Neural Information Processing Systems (2019)."},{"volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=H1Y8hhg0b","author":"Louizos Christos","key":"e_1_3_2_1_35_1","unstructured":"Christos Louizos , Max Welling , and Diederik P. Kingma . 2018. Learning Sparse Neural Networks through L_0 Regularization . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=H1Y8hhg0b Christos Louizos, Max Welling, and Diederik P. Kingma. 2018. Learning Sparse Neural Networks through L_0 Regularization. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=H1Y8hhg0b"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.541"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386012"},{"volume-title":"Techniques for program verification","author":"Nelson Charles Gregory","key":"e_1_3_2_1_38_1","unstructured":"Charles Gregory Nelson . 1980. Techniques for program verification . Stanford University . Charles Gregory Nelson. 1980. Techniques for program verification. Stanford University."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737959"},{"volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","key":"e_1_3_2_1_40_1","unstructured":"Adam Paszke , Sam Gross , Francisco Massa , Adam Lerer , James Bradbury , Gregory Chanan , Trevor Killeen , Zeming Lin , Natalia Gimelshein , Luca Antiga , Alban Desmaison , Andreas Kopf , Edward Yang , Zachary DeVito , Martin Raison , Alykhan Tejani , Sasank Chilamkurthy , Benoit Steiner , Lu Fang , Junjie Bai , and Soumith Chintala . 2019. PyTorch: An Imperative Style , High-Performance Deep Learning Library . In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2308\/ajpt-50009"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00357"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447818.3460375"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386001"},{"key":"e_1_3_2_1_45_1","volume-title":"Privacy in the age of medical big data. Nature medicine 25, 1","author":"Nicholson Price W","year":"2019","unstructured":"W Nicholson Price and I Glenn Cohen . 2019. Privacy in the age of medical big data. Nature medicine 25, 1 ( 2019 ), 37--43. W Nicholson Price and I Glenn Cohen. 2019. Privacy in the age of medical big data. Nature medicine 25, 1 (2019), 37--43."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462176"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_32"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_49_1","volume-title":"Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems 28","author":"Ren Shaoqing","year":"2015","unstructured":"Shaoqing Ren , Kaiming He , Ross Girshick , and Jian Sun . 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems 28 ( 2015 ), 91--99. Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems 28 (2015), 91--99."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"volume-title":"Theory of linear and integer programming","author":"Schrijver Alexander","key":"e_1_3_2_1_52_1","unstructured":"Alexander Schrijver . 1998. Theory of linear and integer programming . John Wiley & Sons . Alexander Schrijver. 1998. Theory of linear and integer programming. John Wiley & Sons."},{"volume-title":"http:\/\/sealcrypto.org. Microsoft Research","author":"SEAL","key":"e_1_3_2_1_53_1","unstructured":"SEAL 2018. Microsoft SEAL (release 3.0). http:\/\/sealcrypto.org. Microsoft Research , Redmond, WA . SEAL 2018. Microsoft SEAL (release 3.0). http:\/\/sealcrypto.org. Microsoft Research, Redmond, WA."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00069"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6409"},{"key":"e_1_3_2_1_56_1","volume-title":"Very deep convolutional networks for large-scale image recognition. ICLR","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015. Very deep convolutional networks for large-scale image recognition. ICLR ( 2015 ). Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. ICLR (2015)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_59"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490422.3502364"},{"key":"e_1_3_2_1_59_1","volume-title":"International conference on machine learning. PMLR, 6105--6114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le . 2019 . Efficientnet: Rethinking model scaling for convolutional neural networks . In International conference on machine learning. PMLR, 6105--6114 . Mingxing Tan and Quoc Le. 2019. Efficientnet: Rethinking model scaling for convolutional neural networks. In International conference on machine learning. PMLR, 6105--6114."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594834.1480915"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407799"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434304"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of Machine Learning and Systems 3","author":"Yang Yichen","year":"2021","unstructured":"Yichen Yang , Phitchaya Phothilimthana , Yisu Wang , Max Willsey , Sudip Roy , and Jacques Pienaar . 2021 . Equality saturation for tensor graph superoptimization . Proceedings of Machine Learning and Systems 3 (2021). Yichen Yang, Phitchaya Phothilimthana, Yisu Wang, Max Willsey, Sudip Roy, and Jacques Pienaar. 2021. Equality saturation for tensor graph superoptimization. Proceedings of Machine Learning and Systems 3 (2021)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01237-3_23"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.37"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240774"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"e_1_3_2_1_68_1","volume-title":"Incremental network quantization: Towards lossless cnns with low-precision weights. arXiv preprint arXiv:1702.03044","author":"Zhou Aojun","year":"2017","unstructured":"Aojun Zhou , Anbang Yao , Yiwen Guo , Lin Xu , and Yurong Chen . 2017. Incremental network quantization: Towards lossless cnns with low-precision weights. arXiv preprint arXiv:1702.03044 ( 2017 ). Aojun Zhou, Anbang Yao, Yiwen Guo, Lin Xu, and Yurong Chen. 2017. Incremental network quantization: Towards lossless cnns with low-precision weights. arXiv preprint arXiv:1702.03044 (2017)."},{"key":"e_1_3_2_1_69_1","volume-title":"DoReFa-Net: Training Low Bitwidth Convolutional Neural Networks with Low Bitwidth Gradients. CoRR abs\/1606.06160","author":"Zhou Shuchang","year":"2016","unstructured":"Shuchang Zhou , Yuxin Wu , Zekun Ni , Xinyu Zhou , He Wen , and Yuheng Zou . 2016. DoReFa-Net: Training Low Bitwidth Convolutional Neural Networks with Low Bitwidth Gradients. CoRR abs\/1606.06160 ( 2016 ). http:\/\/arxiv.org\/abs\/1606.06160 Shuchang Zhou, Yuxin Wu, Zekun Ni, Xinyu Zhou, He Wen, and Yuheng Zou. 2016. DoReFa-Net: Training Low Bitwidth Convolutional Neural Networks with Low Bitwidth Gradients. CoRR abs\/1606.06160 (2016). http:\/\/arxiv.org\/abs\/1606.06160"},{"key":"e_1_3_2_1_70_1","volume-title":"Trained ternary quantization. arXiv preprint arXiv:1612.01064","author":"Zhu Chenzhuo","year":"2016","unstructured":"Chenzhuo Zhu , Song Han , Huizi Mao , and William J Dally . 2016. Trained ternary quantization. arXiv preprint arXiv:1612.01064 ( 2016 ). Chenzhuo Zhu, Song Han, Huizi Mao, and William J Dally. 2016. Trained ternary quantization. arXiv preprint arXiv:1612.01064 (2016)."}],"event":{"name":"PACT '22: International Conference on Parallel Architectures and Compilation Techniques","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IFIP WG 10.3 IFIP WG 10.3","IEEE CS"],"location":"Chicago Illinois","acronym":"PACT '22"},"container-title":["Proceedings of the International Conference on Parallel Architectures and Compilation Techniques"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559009.3569673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3559009.3569673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:45Z","timestamp":1750186845000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559009.3569673"}},"subtitle":["An Equality Saturation Framework for DNN Inference Exploiting Weight Repetition"],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":68,"alternative-id":["10.1145\/3559009.3569673","10.1145\/3559009"],"URL":"https:\/\/doi.org\/10.1145\/3559009.3569673","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]},"assertion":[{"value":"2023-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}