UC San Diego MICS
mics.ucsd.eduWe integrate hardware, software, algorithms and data for scalable analytics and security. Our hardware acceleration and system optimization engines are automated – yet customized. We get best-in-class results. Real-time and Interactive Machine Learning From low-power sensor nodes and mobile devices to data centers and the cloud, our customized performance optimization engine is automated and works across platforms. Our solutions integrate adaptive data collection processes with training, learning, and inference in real-time and streaming applications. Optimized Deep Learning Our framework allows for training of deep learning networks that are platform independent, and scale from sensors to mobile to data centers. We were the first to build and demonstrate deep-learning training on mobile devices. Security and Privacy for Cyber-Physical Systems To secure cyber-physical systems, we fully consider hardware, software, algorithms and data – and their isolation and interactions. This allows us to offer new approaches. Privacy-preserving computing is another focus. Secure embedded medical devices and privacy-preserving DNA analytics are just two examples.
Read moreWe integrate hardware, software, algorithms and data for scalable analytics and security. Our hardware acceleration and system optimization engines are automated – yet customized. We get best-in-class results. Real-time and Interactive Machine Learning From low-power sensor nodes and mobile devices to data centers and the cloud, our customized performance optimization engine is automated and works across platforms. Our solutions integrate adaptive data collection processes with training, learning, and inference in real-time and streaming applications. Optimized Deep Learning Our framework allows for training of deep learning networks that are platform independent, and scale from sensors to mobile to data centers. We were the first to build and demonstrate deep-learning training on mobile devices. Security and Privacy for Cyber-Physical Systems To secure cyber-physical systems, we fully consider hardware, software, algorithms and data – and their isolation and interactions. This allows us to offer new approaches. Privacy-preserving computing is another focus. Secure embedded medical devices and privacy-preserving DNA analytics are just two examples.
Read moreCountry
State
Louisiana
Industry
Employees
11-50
Founded
2016
Social
Employees statistics
View all employeesPotential Decision Makers
Executive Assistant to the Directors
Email ****** @****.comPhone (***) ****-****
Technologies
(1)