Filters








7,059 Hits in 5.8 sec

Demand-driven software race detection using hardware performance counters

Joseph L. Greathouse, Zhiqiang Ma, Matthew I. Frank, Ramesh Peri, Todd Austin
2011 SIGARCH Computer Architecture News  
It is not uncommon for commercial race detectors to experience 300× slowdowns, limiting their usage. This paper presents a hardware-assisted demand-driven race detector.  ...  Dynamic data race detectors are an important mechanism for creating robust parallel programs.  ...  These systems are unable to perform online race detection. There has also been work in performing dynamic race detection within hardware.  ... 
doi:10.1145/2024723.2000084 fatcat:pokfk77j3vgvvc2ywthuatdhqm

Demand-driven software race detection using hardware performance counters

Joseph L. Greathouse, Zhiqiang Ma, Matthew I. Frank, Ramesh Peri, Todd Austin
2011 Proceeding of the 38th annual international symposium on Computer architecture - ISCA '11  
It is not uncommon for commercial race detectors to experience 300× slowdowns, limiting their usage. This paper presents a hardware-assisted demand-driven race detector.  ...  Dynamic data race detectors are an important mechanism for creating robust parallel programs.  ...  These systems are unable to perform online race detection. There has also been work in performing dynamic race detection within hardware.  ... 
doi:10.1145/2000064.2000084 dblp:conf/isca/GreathouseMFPA11 fatcat:ktlxd3qsqrbqhapvgvhepq7jpa

NUDA: A Non-Uniform Debugging Architecture and Nonintrusive Race Detection for Many-Core Systems

Chi-Neng Wen, Shu-Hsuan Chou, Chien-Chih Chen, Tien-Fu Chen
2012 IEEE transactions on computers  
Our approach makes hardware-assisted debugging both feasible and scalable for many-core processing scenarios.  ...  The union of all the caches can serve as a race detection probe without disturbing execution ordering.  ...  Data Race Detection Flow This work proposes a case study of hardware lockset-based race detection by configuring a NUDA.  ... 
doi:10.1109/tc.2010.254 fatcat:6bcrurc6p5aenojnwikfsqhvcy

INS/GNSS Integration for Aerobatic Flight Applications and Aircraft Motion Surveying

Edgar v. Hinüber, Christian Reimer, Tim Schneider, Michael Stock
2017 Sensors  
As a real-world example, the aerobatic maneuvers of the World Champion 2016 (Red Bull Air Race) are presented.  ...  scientific applications, to be able to understand the requirements of sensor performance, signal processing and sensor data fusion better.  ...  Acknowledgments: The authors would like to thank Matthias Dolderer (MD21) and Columbia University, New York, for the provision of the recorded data and the permission to publish results obtained from the  ... 
doi:10.3390/s17050941 pmid:28445417 pmcid:PMC5461065 fatcat:wjiyoipxmbb57mbl7mffl4454y

Guardrail

Olatunji Ruwase, Michael A. Kozuch, Phillip B. Gibbons, Todd C. Mowry
2014 Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14  
and mitigate more challenging correctness bugs (e.g., data races, uninitialized memory accesses) that cannot be detected by today's fault isolation techniques.  ...  Also, with hardware logging support, Guardrail can be used for online protection of persistent device state from driver bugs with at most 10% overhead on the end-to-end performance of most standard I/O  ...  DRCheck: Detecting Data Races Our first dynamic analysis tool, DRCheck, detects data races in kernel-mode drivers.  ... 
doi:10.1145/2541940.2541970 dblp:conf/asplos/RuwaseKGM14 fatcat:h7qrjl77srfdtixpvl7fv3ts4m

Scalable dynamic information flow tracking and its applications

Rajiv Gupta, Neelam Gupta, Xiangyu Zhang, Dennis Jeffrey, Vijay Nagarajan, Sriraman Tallam, Chen Tian
2008 Proceedings, International Parallel and Distributed Processing Symposium (IPDPS)  
), and data validation (lineage tracing of scientific data).  ...  We are designing scalable dynamic information flow tracking techniques and employing them to carry out tasks related to debugging (bug location and fault avoidance), security (software attack detection  ...  Work in Progress Our ongoing work is focused on online, cost effective tracing of parallel applications as well as data race detection in parallel applications.  ... 
doi:10.1109/ipdps.2008.4536382 dblp:conf/ipps/GuptaGZJNTT08 fatcat:adkkludfwvdejkfra3mitwlmiq

Benchmarking Brain-Computer Interfaces Outside the Laboratory: The Cybathlon 2016

Domen Novak, Roland Sigrist, Nicolas J. Gerig, Dario Wyss, René Bauer, Ulrich Götz, Robert Riener
2018 Frontiers in Neuroscience  
This approach was used at the Cybathlon 2016, a competition for people with disabilities who use assistive technology to achieve tasks.  ...  The paper summarizes the technical challenges of BCIs, describes the design of the benchmarking game, then describes the rules for acceptable hardware, software and inclusion of human pilots in the BCI  ...  CONCLUSION Having successfully concluded the Cybathlon 2016, we are confident that our BCI race represents a valid method of benchmarking BCIs online and is a reasonable approximation of actual assistive  ... 
doi:10.3389/fnins.2017.00756 pmid:29375294 pmcid:PMC5768650 fatcat:avd764p23bab7i5qcfm6vtl4dy

A regulated transitive reduction (RTR) for longer memory race recording

Min Xu, Mark D. Hill, Rastislav Bodik
2006 Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII  
Memory race recording is a key technology for multithreaded deterministic replay.  ...  In this paper, we considerably improve our previous always-on Flight Data Recorder (FDR) in four ways: • Longer recording by reducing the log size growth rate to approximately one byte per thousand dynamic  ...  Thus, they can benefit directly from our better and cheaper memory race recording. ReEnact [25] and CORD [24] aim to provide hardware-assisted online data race detection.  ... 
doi:10.1145/1168857.1168865 dblp:conf/asplos/XuHB06 fatcat:vkew2esr45fdpmypiwzfgtzmbm

A case for unlimited watchpoints

Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd Austin
2012 Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '12  
As an example of the power of such a system, it is possible to use watchpoints to accelerate read/write set checks in a software data race detector by nearly 9×.  ...  This paper demonstrates that the ability to set an unlimited number of fine-grain data watchpoints can reduce the runtime overheads of numerous dynamic software analysis techniques.  ...  Acknowledgments We wish to thank Debapriya Chatterjee, Andrea Pellegrini, and the anonymous reviewers, whose suggestions greatly improved this work, as well as Evelyn Duesterwald from IBM Research, for assistance  ... 
doi:10.1145/2150976.2150994 dblp:conf/asplos/GreathouseXLA12 fatcat:sirwrqqo4zenllc3fn2kpgps6e

A case for unlimited watchpoints

Joseph L. Greathouse, Hongyi Xin, Yixin Luo, Todd Austin
2012 SIGARCH Computer Architecture News  
As an example of the power of such a system, it is possible to use watchpoints to accelerate read/write set checks in a software data race detector by nearly 9×.  ...  This paper demonstrates that the ability to set an unlimited number of fine-grain data watchpoints can reduce the runtime overheads of numerous dynamic software analysis techniques.  ...  Acknowledgments We wish to thank Debapriya Chatterjee, Andrea Pellegrini, and the anonymous reviewers, whose suggestions greatly improved this work, as well as Evelyn Duesterwald from IBM Research, for assistance  ... 
doi:10.1145/2189750.2150994 fatcat:tgjib5rsabfidiwgikxdzcgjie

Log-based architectures

Shimin Chen, Phillip B. Gibbons, Michael Kozuch, Todd C. Mowry
2011 ACM SIGOPS Operating Systems Review  
To help detect and fix software bugs, we have been exploring techniques for accelerating dynamic program monitoring tools, which we call "lifeguards".  ...  To accomplish this, we propose hardware mechanisms to create a dynamic log of instruction-level events in the monitored application and stream this information to one or more software lifeguards running  ...  While there have been a number of hardware proposals for accelerating a specific class of lifeguards (e.g., lifeguards for memoryaccess monitoring [32, 36, 41] , data-race detection [40] , or information-flow  ... 
doi:10.1145/1945023.1945034 fatcat:rilpizgqlnetdophuh6ttfgks4

Honeynets: a tool for counterintelligence in online security

David Watson
2007 Network Security  
Research honeynets are used to gather information about current computer security threats, help detect worm outbreaks and assist in tracking global information security trends.  ...  However, blackhat research in this area also remains active, and it is likely that specific attacks against virtual honeynets will be detected in the coming years, continuing the honeynet arms race.  ... 
doi:10.1016/s1353-4858(07)70004-1 fatcat:zozulyisfnamjjjwetcc755rca

Falcon: a highly flexible open-source software for closed-loop neuroscience

Davide Ciliberti, Fabian Kloosterman
2017 Journal of Neural Engineering  
, Joana Serpa Santos for providing the datasets used for testing online ripple detection and Nicolas Sist for his feedback on the installation and use of the software.  ...  Acknowledgments We are grateful to Cristian Inel for his important contrib ution in the development of a predecessor software framework, Frédéric Michon for his help with online burst detection in vivo  ...  A low fraction of bursts was detected twice online (6% of all online detections, corresponding to 0.05 detections s −1 ).  ... 
doi:10.1088/1741-2552/aa7526 pmid:28548044 fatcat:g44ybgrcujc6zaurorxnswvvpu

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing [chapter]

Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin
2021 Lecture Notes in Computer Science  
Experimental results show that Specularizer yields superior detection accuracy and the online tracing of Specularizer incur reasonable overhead.  ...  Different from prior works that use performance counters to detect side-channel attacks, Specularizer monitors triggers of the critical paths of the speculative execution attacks, thus making the detection  ...  Discussion Detecting Assistance-Based Attacks. Microcode assist was exploited in some recent works [31, 37, 42, 43] . However, there is no systematic study of these microcode assists yet.  ... 
doi:10.1007/978-3-030-80825-9_8 fatcat:hqxoye425vcgjcbsgqcypa2jbi

Computerized-Eyewear Based Face Recognition System for Improving Social Lives of Prosopagnosics

Weidong Shi, Xi Wang, Xi Zhao, Varun Prakash, Omprakash Gnawali
2013 Proceedings of the ICTs for improving Patients Rehabilitation Research Techniques  
Online: In the online phase, the application detects faces on the video sent from the camera.  ...  Hardware The real-time system discussed in this paper requires a hardware setup that is portable and can accompany the patient without causing any discomfort.  ... 
doi:10.4108/icst.pervasivehealth.2013.252119 dblp:conf/ph/WangZPSG13 fatcat:w7wk3mn745cmnf7jrptgc6wugm
« Previous Showing results 1 — 15 out of 7,059 results