628 Hits in 4.5 sec

Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics

Lide Duan, Bin Li, Lu Peng
2009 2009 IEEE 15th International Symposium on High Performance Computer Architecture  
between a key processor structure's AVF and various performance metrics.  ...  Architectural Vulnerability Factor (AVF) reflects the possibility that a transient fault eventually causes a visible error in the program output, and it indicates a system's susceptibility to transient  ...  Versatile AVF Prediction Generally, we believe that the AVF value of a key processor structure is a complex function of a large set of processor performance metrics.  ... 
doi:10.1109/hpca.2009.4798244 dblp:conf/hpca/DuanLP09 fatcat:3r6x3oleqbb63al6t43ufvlaxq

Efficient Microarchitectural Vulnerabilities Prediction Using Boosted Regression Trees and Patient Rule Inductions

Bin Li, Lide Duan, Lu Peng
2010 IEEE transactions on computers  
between a key processor structure's AVF and various performance metrics.  ...  Architectural Vulnerability Factor (AVF) reflects the possibility that a transient fault eventually causes a visible error in the program output, and it indicates a system's susceptibility to transient  ...  VERSATILE AVF PREDICTION Generally, we believe that the AVF value of a key processor structure is a complex function of a large set of processor performance metrics.  ... 
doi:10.1109/tc.2009.140 fatcat:3ljjwcdfyvcvvigqeoubg4u3qa

Accurate and Simplified Prediction of L2 Cache Vulnerability for Cost-Efficient Soft Error Protection

Yu CHENG, Anguo MA, Minxuan ZHANG
2012 IEICE transactions on information and systems  
Then we employ bump hunting technique to extract some simple selecting rules based on several key performance metrics for a simplified and fast estimation of L2 cache AVF.  ...  In this paper, we propose an improved AVF estimation framework for conducing comprehensive characterization of dynamic behavior and predictability of L2 cache vulnerability.  ...  [9] introduced the concept of Architectural Vulnerability Factor (AVF) for the measurement of soft error rate. And Biswas et al.  ... 
doi:10.1587/transinf.e95.d.56 fatcat:r3uymjq6qbbrjkjeuuqnao56r4

A Survey of Machine Learning for Computer Architecture and Systems [article]

Nan Wu, Yuan Xie
2021 arXiv   pre-print
In this paper, we present a comprehensive review of work that applies ML for system design, which can be grouped into two major categories, ML-based modelling that involves predictions of performance metrics  ...  For ML-based modelling, we discuss existing studies based on their target level of system, ranging from the circuit level to the architecture/system level.  ...  for fast and accurate performance estimation.  ... 
arXiv:2102.07952v1 fatcat:vzj776a6abesljetqobakoc3dq

Systematic Approach for State-of-the-Art Architectures and System-on-chip Selection for Heterogeneous IoT Applications

Ramesh Krishnamoorthy, Kalimuthu Krishnan, Bharatiraja Chokkalingam, Sanjeevikumar Padmanaban, Zbigniew Leonowicz, Jens Bo Holm-Nielsen, Massimo Mitolo
2021 IEEE Access  
The outcome of SoCs attained through the GA are tested by analyzing their execution time and performance using various evaluation benchmarks.  ...  The Internet of Things (IoT) refers to a network of physical devices, which collects data and processes into a system without human intervention.  ...  APPLICATION-SPECIFIC PROCESSOR ARCHITECTURE The organization of cache differs from a general-purpose processor to DSP or ASIC devices.  ... 
doi:10.1109/access.2021.3055650 fatcat:n5yo3savcjdyxdolpwrlc5dza4

Report on the development of the Advanced Encryption Standard (AES)

J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback
2001 Journal of Research of the National Institute of Standards and Technology  
NIST reviewed the results of this preliminary research and selected MARS, RC6™, Rijndael, Serpent and Twofish as finalists.  ...  In 1998, NIST announced the acceptance of fifteen candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates.  ...  Acknowledgements NIST is grateful for the efforts of all the AES candidate algorithm submitters, namely for their work in preparing the submission packages, answering questions and providing support during  ... 
doi:10.6028/jres.106.023 pmid:27500035 pmcid:PMC4863838 fatcat:5z6apmeharczrlys346zrwybie

Algorithm-based low-power and high-performance multimedia signal processing

K.J. Ray Liu, An-Yeu Wu, A. Raghupathy, Jie Chen
1998 Proceedings of the IEEE  
Such an architecture forms a new generation of high-performance embedded signal processor based on the adaptive computing model.  ...  A digital-signal-processing engine that is an adaptive reconfigurable architecture is also derived from the common features of our approach.  ...  However, the pel-based estimation methods are very vulnerable to noise by virtue of their involving only local operations and may suffer from the instability problem.  ... 
doi:10.1109/5.687834 fatcat:s7ujyq5ovncsnejzocdcsylqde


Eric S. Chung, Michael K. Papamichael, Eriko Nurvitadhi, James C. Hoe, Ken Mai, Babak Falsafi
2009 ACM Transactions on Reconfigurable Technology and Systems  
Functional full-system simulators are powerful and versatile research tools for accelerating architectural exploration and advanced software development.  ...  We propose the PROTOFLEX simulation architecture, which uses FPGAs to accelerate full-system multiprocessor simulation and to facilitate high-performance instrumentation.  ...  ACKNOWLEDGMENTS We thank our colleagues in the RAMP and TRUSS projects for their interaction and feedback. We also thank SPARC International for the use of the SPARCV9 compliance test.  ... 
doi:10.1145/1534916.1534925 fatcat:3botpafrhzdxpghnslzmgh74u4

Simulation-based Evolutionary Optimization of Air Traffic Management

Alessandro Pellegrini, Pierangelo Di Sanzo, Beatrice Bevilacqua, Gabriella Duca, Domenico Pascarella, Roberto Palumbo, Juan Jose Ramos, Miquel Angel Piera, Gabriella Gigante
2020 IEEE Access  
Such optimization is intended with respect to the estimated performance of the simulated ATM system and implies the minimization or maximization of some reference ATM performance metrics in the identified  ...  evaluation of performance metrics.  ...  She is Human Factors consultant and independent researcher specialised in transdisciplinary application of human factors with focus on task analysis, process design, human performances, work spaces & interfaces  ... 
doi:10.1109/access.2020.3021192 fatcat:z2piim2dr5bixbmv5u55uyk5qq

Progress in neuromorphic photonics

Thomas Ferreira de Lima, Bhavin J. Shastri, Alexander N. Tait, Mitchell A. Nahmias, Paul R. Prucnal
2017 Nanophotonics  
The proposed photonic architecture revolves around the processing network node composed of two parts: a nonlinear element and a network interface.  ...  Many believe that the one-size-fits-all solution of digital electronics is becoming a limiting factor in certain areas such as data links, cognitive radio, and ultrafast control.  ...  Increasing the channel count performance metric will eventually degrade some other aspects of performance until the minimum specification is violated.  ... 
doi:10.1515/nanoph-2016-0139 fatcat:rqa7k7bjmzgnbcmokjpfoetbru

Deep learning for time series classification in ecology [article]

Cesar Capinha, Ana Ceia-Hasse, Andrew M. Kramer, Christiaan Meijer
2020 biorxiv/medrxiv   pre-print
We describe some of the deep learning architectures relevant for time series classification and show how these architectures and their hyper-parameters can be tested and used for the classification problem  ...  climatic variables and iii) the classification of phenological phases from continuous meteorological data. 3.  ...  Finally, the performance of the model having an 'optimal' number of training epochs is evaluated using a 'final' test data set (T; Fig. 2 ), providing the best estimate of the predictive performance of  ... 
doi:10.1101/2020.09.14.296251 fatcat:3ebrwl2bozexzdt6qoo4g7v32y

Open Sesame: The Password Hashing Competition and Argon2 [article]

Jos Wetzels
2016 arXiv   pre-print
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and properties  ...  CPU-Hardness: The Argon2 scheme is optimized for the x86 architecture (by relying on cache and memory organization of recent Intel and AMD processors) and specifically designed to be GPU/FPGA/ASIC-unfriendly  ...  ] metric is used.  ... 
arXiv:1602.03097v2 fatcat:cvsjzq4wifbp7kkcktsuiisy7a

Heterogeneity-aware Fault Tolerance using a Self-Organizing Runtime System [article]

Mario Kicherer, Wolfgang Karl
2014 arXiv   pre-print
This extension uses a new metric to dynamically rate the remaining benefit of unreliable processing units and a memory management mechanism for automatic data transfers and checkpointing in the host and  ...  To automatically leverage this diversity, we introduce an extension of an online-learning runtime system that combines the benefits of the existing performance-oriented task mapping with task duplication  ...  Therefore, we propose the use of a simple metric called fault-aware runtime estimation that is calculated from the fault-free execution time and the observed fault rate of the processing unit.  ... 
arXiv:1405.2912v1 fatcat:o2cjrttuhveghghktmku7kdhcm

Neuromorphic Photonics, Principles of [chapter]

Bhavin J. Shastri, Alexander N. Tait, Thomas Ferreira de Lima, Mitchell A. Nahmias, Hsuan-Tung Peng, Paul R. Prucnal
2018 Encyclopedia of Complexity and Systems Science  
We provide an overview of neuromorphic computing, discuss the associated technology (microelectronic and photonic) platforms and compare their metric performance.  ...  We discuss photonic neural network approaches and challenges for integrated neuromorphic photonic processors while providing an in-depth description of photonic neurons and a candidate interconnection  ...  Nevertheless, the brain as a processor differs radically from computers today, both at the physical level and at the architectural level.  ... 
doi:10.1007/978-3-642-27737-5_702-1 fatcat:h3qtsskafzgq3ipmtxa2xlfksi

Self-awareness of Cloud Applications [chapter]

Alex Iosup, Xiaoyun Zhu, Arif Merchant, Eva Kalyvianaki, Martina Maggio, Simon Spinner, Tarek Abdelzaher, Ole Mengshoel, Sara Bouchenak
2017 Self-Aware Computing Systems  
We map important applications corresponding to popular and emerging application domains to this conceptual framework, and compare the practical characteristics, benefits, and drawbacks of self-awareness  ...  To address the scale, growth, and reliability of cloud applications, self-aware management and scheduling are becoming commonplace. How are they used in practice?  ...  , by the Dutch KIEM project KIESA, and by a generous ERO gift from Oracle, by the European FP7 research project AMADEOS Grant Agreement 610535 on Systems of Systems, by the Swedish Research Council (VR  ... 
doi:10.1007/978-3-319-47474-8_20 fatcat:ckcxfmjmvvas5bhg7wp5qfmehy
« Previous Showing results 1 — 15 out of 628 results