-
公开(公告)号:US20190325316A1
公开(公告)日:2019-10-24
申请号:US16457133
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Todd A. Anderson , Mohammad Mejbah Ul Alam , Shengtian Zhou , Justin Gottschlich
Abstract: Example apparatus and methods for program synthesis using genetic algorithms are disclosed herein. An example apparatus includes a program length predictor to predict a length of a first program by executing a first neural network model, a program generator to generate a candidate program having a length corresponding to the predicted length, a candidate program analyzer to generate a fitness score for the candidate program by executing a second neural network model and to identify the first candidate program for use in a breeding operation relative a second candidate program based on the fitness score, and a genetic program generator to perform the breeding operation with at least one of the first candidate program or the second candidate program to generate an evolved candidate program.
-
22.
公开(公告)号:US20190317844A1
公开(公告)日:2019-10-17
申请号:US16453816
申请日:2019-06-26
Applicant: Intel Corporation
Inventor: Justin Gottschlich , Mohammad Mejbah Ul Alam , Shengtian Zhou
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to select code data structure types. An example disclosed apparatus includes an application programming interface (API) engine to generate an abstract data structure (ADS) placeholder in a location of a code sample corresponding to a memory operation, and a data structure selector to select a first candidate data structure having a first candidate data structure type, the first candidate data structure to service the memory operation of the ADS placeholder. The example apparatus also includes a workload engine to select a first candidate workload type to be processed by the selected first candidate data structure, and an execution logger to log first code performance metrics during execution of the code sample during a first iteration corresponding to the first candidate data structure type and the first candidate workload type, and log second code performance metrics during execution of the code sample during a second duration corresponding to a second candidate data structure type and the first candidate workload type. The example apparatus also includes a classification engine to select one of the first candidate data structure type or the second candidate data structure type based on a relative ranking of the first and second code performance metrics.
-
23.
公开(公告)号:US20190317737A1
公开(公告)日:2019-10-17
申请号:US16455259
申请日:2019-06-27
Applicant: Intel Corporation
Inventor: Thijs Metsch , Mohammad Mejbah Ul Alam , Justin Gottschlich
Abstract: Methods, apparatus, systems and articles of manufacture to recommend instruction adaptations to improve compute performance are disclosed. An example apparatus includes a pattern detector to detect an execution pattern from an execution profile provided by a server, the execution profile associated with an instruction stored in an instruction repository. An adaptation identifier is to identify a possible instruction adaptation that may be applied to the instruction associated with the execution pattern. A model processor is to predict, using a machine learning model, an expected performance improvement of the adaptation. A result comparator is to determine whether the expected performance improvement meets an threshold. An instruction editor is to, in response to the result comparator determining that the expected performance improvement meets the threshold, apply the possible instruction adaptation to the instruction in the instruction repository.
-
公开(公告)号:US20190147162A1
公开(公告)日:2019-05-16
申请号:US16226137
申请日:2018-12-19
Applicant: Intel Corporation
Inventor: Mohammad Mejbah Ul Alam , Justin Gottschlich , Shengtian Zhou
Abstract: Methods, apparatus, systems and articles of manufacture to identify a side-channel attack are disclosed. An example apparatus includes a vector-to-neuron processor to map an event vector to a neuron of a trained self-organizing map; a buffer processor to identify a task pair based on the neuron and an adjacent neuron of the neuron; a buffer to store data corresponding to the identified task pair; an attack identifier to, when information stored in the buffer corresponds to more than a threshold number of task pairs corresponding to the identified task pair, identify a malware attack; and a mitigation technique selector to select a technique for mitigating the malware attack
-
公开(公告)号:US20190138423A1
公开(公告)日:2019-05-09
申请号:US16235959
申请日:2018-12-28
Applicant: Intel Corporation
Inventor: Mats Agerstam , Bahareh Sadeghi , Jason Martin , Jeffrey Ota , Justin Gottschlich , Marcos Carranza , Maria Ramirez Loaiza , Alexander Heinecke , Mohammad Mejbah Ul Alam , Robert Colby , Sara Baghsorkhi , Shengtian Zhou
Abstract: An apparatus includes a data interface to obtain first sensor data from a first sensor and second sensor data from a second sensor of a monitored system; a data analyzer to extract a feature based on analyzing the first and second sensor data using a model, the model trained based on historical sensor data, the model to determine the feature as a deviation between the first and second sensor data to predict a future malfunction of the monitored system; an anomaly detector to detect an anomaly in at least one of the first sensor data or the second sensor data based on the feature, the anomaly corresponding to the future malfunction of the monitored system; and a system applicator to modify operation of the monitored system based on the anomaly.
-
公开(公告)号:US20190129822A1
公开(公告)日:2019-05-02
申请号:US16234503
申请日:2018-12-27
Applicant: Intel Corporation
Inventor: Mohammad Mejbah Ul Alam , Jason Martin , Justin Gottschlich , Alexander Heinecke , Shengtian Zhou
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed. An example system includes a memory accessed by a program of interest, a performance monitoring unit to collect first memory access information and second memory access information about an object accessed in the memory by the program of interest; and a leak detector to: determine a non-access period based on the first memory access information and an unsupervised machine learning model trained based on the program of interest; and detect a potential memory leak of the program of interest based on the second memory access information and the non-access period.
-
-
-
-
-