首页 > 最新文献

Proceedings of the 17th ACM International Conference on Computing Frontiers最新文献

英文 中文
A critical view on moving target defense and its analogies 对移动目标防御及其类比的批判
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3397225
Alexander Bajic, G. Becker
In the last decade the Moving Target Defense (MTD) has gained popularity as a new cyber security defense paradigm. Moving Target Defense (MTD) intends to change the (presumable) information asymmetry between attacker and defender in favor of the defender by constantly changing a network's appearance as to invalidate previously acquired information. Many papers discussing MTD have been proposed and in recent years MTD techniques for a wide range of applications in enterprise networks, Cloud environments, IoT, automotive CAN buses and smart grids have been proposed. In these papers, MTD is often introduced as a "game changer" and explained with help of nice figurative analogies. Yet, how useful are these repeated changes really to deter the attacker? And even more importantly, could it not be that there are downsides to the constant changes that, ultimately, degrade security? In this position paper we argue that one needs to have a more critical and open minded view on MTD. There are MTD techniques that improve security. But we also provide several examples where they reduce security or where movement does not matter at all and is only introduced as to label a given technique as MTD.
在过去的十年中,移动目标防御(MTD)作为一种新的网络安全防御范式得到了广泛的应用。移动目标防御(MTD)旨在通过不断改变网络的外观,使先前获得的信息失效,从而改变攻击者和防御者之间(假定的)信息不对称,有利于防御者。许多讨论MTD的论文已经被提出,近年来,MTD技术在企业网络、云环境、物联网、汽车CAN总线和智能电网中的广泛应用已经被提出。在这些论文中,MTD经常被介绍为“游戏规则改变者”,并借助漂亮的比喻来解释。然而,这些重复的更改对阻止攻击者有多大用处呢?更重要的是,不断的变化是否会有不利的一面,最终会降低安全性?在这一立场文件中,我们认为人们需要对MTD持更批判和开放的态度。有一些MTD技术可以提高安全性。但是我们也提供了几个例子,其中它们降低了安全性,或者移动根本无关紧要,并且只是为了将给定的技术标记为MTD而引入。
{"title":"A critical view on moving target defense and its analogies","authors":"Alexander Bajic, G. Becker","doi":"10.1145/3387902.3397225","DOIUrl":"https://doi.org/10.1145/3387902.3397225","url":null,"abstract":"In the last decade the Moving Target Defense (MTD) has gained popularity as a new cyber security defense paradigm. Moving Target Defense (MTD) intends to change the (presumable) information asymmetry between attacker and defender in favor of the defender by constantly changing a network's appearance as to invalidate previously acquired information. Many papers discussing MTD have been proposed and in recent years MTD techniques for a wide range of applications in enterprise networks, Cloud environments, IoT, automotive CAN buses and smart grids have been proposed. In these papers, MTD is often introduced as a \"game changer\" and explained with help of nice figurative analogies. Yet, how useful are these repeated changes really to deter the attacker? And even more importantly, could it not be that there are downsides to the constant changes that, ultimately, degrade security? In this position paper we argue that one needs to have a more critical and open minded view on MTD. There are MTD techniques that improve security. But we also provide several examples where they reduce security or where movement does not matter at all and is only introduced as to label a given technique as MTD.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"45 2-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automaton-based methodology for implementing optimization constraints for quantum annealing 基于自动机的量子退火优化约束实现方法
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3392619
H. Djidjev
Quantum annealing computers are designed to produce high-quality solutions to optimization problems that can be formulated as quadratic unconstrained binary optimization (QUBO) problems. While most of the well known NP-hard problems can easily be represented as quadratic binary problems, such formulations usually contain constraints that have to be added as penalties to the objective function in order to obtain QUBOs. In this paper, we propose a method based on finite automaton representation of the constraints for generating penalty implementations for them, which uses fewer qubits than the alternatives and is general enough to be applied to a whole class of constraints.
量子退火计算机的设计目的是为可表述为二次无约束二进制优化(QUBO)问题的优化问题提供高质量的解决方案。虽然大多数众所周知的np困难问题可以很容易地表示为二次二进制问题,但这些公式通常包含约束,必须作为惩罚添加到目标函数中才能获得qubo。在本文中,我们提出了一种基于约束的有限自动机表示来生成惩罚实现的方法,该方法比替代方法使用更少的量子位,并且足够通用,可以应用于一整类约束。
{"title":"Automaton-based methodology for implementing optimization constraints for quantum annealing","authors":"H. Djidjev","doi":"10.1145/3387902.3392619","DOIUrl":"https://doi.org/10.1145/3387902.3392619","url":null,"abstract":"Quantum annealing computers are designed to produce high-quality solutions to optimization problems that can be formulated as quadratic unconstrained binary optimization (QUBO) problems. While most of the well known NP-hard problems can easily be represented as quadratic binary problems, such formulations usually contain constraints that have to be added as penalties to the objective function in order to obtain QUBOs. In this paper, we propose a method based on finite automaton representation of the constraints for generating penalty implementations for them, which uses fewer qubits than the alternatives and is general enough to be applied to a whole class of constraints.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 17th ACM International Conference on Computing Frontiers 第17届ACM计算前沿国际会议论文集
{"title":"Proceedings of the 17th ACM International Conference on Computing Frontiers","authors":"","doi":"10.1145/3387902","DOIUrl":"https://doi.org/10.1145/3387902","url":null,"abstract":"","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123956689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Terminator: a data-level hybrid framework for intellectual property theft detection and prevention 终结者:用于知识产权盗窃检测和预防的数据级混合框架
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3392329
Meichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu
Recently, high profile data breach incidents have highlighted the importance of insider Intellectual Property(IP) theft research. Matching the patterns of known attack (filtering-based or rule-based) and finding the deviation from normal behavior (anomaly-based) are two typical approaches to prevent insiders from stealing sensitive information. On the one hand, filtering-based or rule-based solutions provide accurate identification of known attacks, and thus they are suitable for IP theft prevention, but they cannot handle the insiders with in-depth knowledge of the protective measures. On the other hand, anomaly-based solutions can find unknown attacks but typically have a high false-positive rate, which limits their applicability to practice. Nowadays, more and more researchers believe that the insider attack could be improved when combining known attack pattern matching with anomaly detection technologies. Therefore, in this paper, we introduce a Data-level Hybrid Framework, dubbed as Terminator, which enabling both detection and prevention. Terminator integrates a prevention module with an anomaly detection module and uses feedback to improve the module for detection or prevention. Different from previous anomaly-based methods that could only detect anomalous activities, Terminator could detect the stealing actions proactively and take real-time actions on these actions. The effectiveness of Terminator is demonstrated by its excellent performances on a collected dataset, involving detailed information in a real-world insider network and attack data simulated by impersonating the genuine users.
最近,备受瞩目的数据泄露事件凸显了内部知识产权(IP)盗窃研究的重要性。匹配已知攻击的模式(基于过滤或基于规则)和发现与正常行为的偏差(基于异常)是防止内部人员窃取敏感信息的两种典型方法。一方面,基于过滤或基于规则的解决方案能够准确识别已知的攻击,因此适合IP盗窃防范,但无法处理对保护措施了解深入的内部人员。另一方面,基于异常的解决方案可以发现未知攻击,但通常具有很高的假阳性率,这限制了它们在实践中的适用性。目前,越来越多的研究人员认为,将已知的攻击模式匹配技术与异常检测技术相结合,可以改进内部攻击。因此,在本文中,我们引入了一个数据级混合框架,称为终结者,它可以同时实现检测和预防。终结者将预防模块和异常检测模块集成在一起,通过反馈对模块进行改进,实现检测或预防。与以往基于异常的方法只能检测异常活动不同,Terminator能够主动检测到窃取行为,并对这些行为进行实时处理。终结者在收集的数据集上的出色性能证明了它的有效性,这些数据集涉及真实世界内部网络中的详细信息和通过冒充真实用户模拟的攻击数据。
{"title":"Terminator: a data-level hybrid framework for intellectual property theft detection and prevention","authors":"Meichen Liu, Meimei Li, Degang Sun, Zhixin Shi, Bin Lv, Pengcheng Liu","doi":"10.1145/3387902.3392329","DOIUrl":"https://doi.org/10.1145/3387902.3392329","url":null,"abstract":"Recently, high profile data breach incidents have highlighted the importance of insider Intellectual Property(IP) theft research. Matching the patterns of known attack (filtering-based or rule-based) and finding the deviation from normal behavior (anomaly-based) are two typical approaches to prevent insiders from stealing sensitive information. On the one hand, filtering-based or rule-based solutions provide accurate identification of known attacks, and thus they are suitable for IP theft prevention, but they cannot handle the insiders with in-depth knowledge of the protective measures. On the other hand, anomaly-based solutions can find unknown attacks but typically have a high false-positive rate, which limits their applicability to practice. Nowadays, more and more researchers believe that the insider attack could be improved when combining known attack pattern matching with anomaly detection technologies. Therefore, in this paper, we introduce a Data-level Hybrid Framework, dubbed as Terminator, which enabling both detection and prevention. Terminator integrates a prevention module with an anomaly detection module and uses feedback to improve the module for detection or prevention. Different from previous anomaly-based methods that could only detect anomalous activities, Terminator could detect the stealing actions proactively and take real-time actions on these actions. The effectiveness of Terminator is demonstrated by its excellent performances on a collected dataset, involving detailed information in a real-world insider network and attack data simulated by impersonating the genuine users.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124033956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Building a portable deeply-nested implicit information flow tracking 构建可移植的深嵌套隐式信息流跟踪
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3392614
L. S. D. Araújo, L. A. J. Marzulo, Tiago A. O. Alves, F. França, I. Koren, S. Kundu
Dynamic Information Flow Tracking has been successfully used to prevent a wide range of attacks and detect illegal access to sensitive information. Most proposed solutions only track the explicit information flow where the taint is propagated through data dependencies. However, recent evasion attacks exploit implicit flows, that use control flow in the application, to manipulate the data thus making the malicious activity undetectable. We propose NIFT - a nested implicit flow tracking mechanism that extends explicit propagation to instructions affected by a control dependency. Our technique generates taint instructions at compile time which are executed by specialized hardware to propagate taint implicitly even in cases of deeply-nested branches. In addition, we propose a restricted taint propagation for data executed in conditional branches that affects only immediate instructions instead of all instructions inside the branch scope. Our technique efficiently locates implicit flows and resolves them with negligible performance overhead. Moreover, it mitigates the over-tainting problem.
动态信息流跟踪已成功地用于防止各种攻击和检测对敏感信息的非法访问。大多数建议的解决方案只跟踪通过数据依赖关系传播污染的显式信息流。然而,最近的逃避攻击利用隐式流(在应用程序中使用控制流)来操纵数据,从而使恶意活动无法检测到。我们提出了NIFT——一个嵌套的隐式流跟踪机制,它将显式传播扩展到受控制依赖关系影响的指令。我们的技术在编译时生成污染指令,这些指令由专门的硬件执行,即使在深嵌套分支的情况下也可以隐式传播污染。此外,我们建议对在条件分支中执行的数据进行限制的污染传播,仅影响立即指令,而不是分支范围内的所有指令。我们的技术可以有效地定位隐式流并以微不足道的性能开销解决它们。此外,它还缓解了过度污染的问题。
{"title":"Building a portable deeply-nested implicit information flow tracking","authors":"L. S. D. Araújo, L. A. J. Marzulo, Tiago A. O. Alves, F. França, I. Koren, S. Kundu","doi":"10.1145/3387902.3392614","DOIUrl":"https://doi.org/10.1145/3387902.3392614","url":null,"abstract":"Dynamic Information Flow Tracking has been successfully used to prevent a wide range of attacks and detect illegal access to sensitive information. Most proposed solutions only track the explicit information flow where the taint is propagated through data dependencies. However, recent evasion attacks exploit implicit flows, that use control flow in the application, to manipulate the data thus making the malicious activity undetectable. We propose NIFT - a nested implicit flow tracking mechanism that extends explicit propagation to instructions affected by a control dependency. Our technique generates taint instructions at compile time which are executed by specialized hardware to propagate taint implicitly even in cases of deeply-nested branches. In addition, we propose a restricted taint propagation for data executed in conditional branches that affects only immediate instructions instead of all instructions inside the branch scope. Our technique efficiently locates implicit flows and resolves them with negligible performance overhead. Moreover, it mitigates the over-tainting problem.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132170660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Byzantine fault tolerance for centrally coordinated missions with unmanned vehicles 无人驾驶车辆集中协调任务的拜占庭容错
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3392622
Nasos Grigoropoulos, Manos Koutsoubelias, S. Lalis
Autonomous unmanned vehicles can support a wide range of missions, which are typically coordinated by a human operator. Automating these missions through a computer program can offer great advantages, but at the same time introduces several challenges. In particular, it becomes important to tolerate failures of the mission controller, including the most general type, namely Byzantine failures. To address this challenge, we propose an active replication approach adapted to the characteristics of this particular type of system. Our solution relies on signed messages and requires N = 2 × f + 1 mission controller replicas to tolerate f Byzantine failures. We describe the system model and the mechanisms that need to be in place to achieve the desired functionality, and argue about the correctness of the proposed approach in an informal way. Also, we evaluate the overheads of a prototype implementation through indicative simulation experiments.
自主无人驾驶车辆可以支持广泛的任务,这些任务通常由人类操作员协调。通过计算机程序自动化这些任务可以提供巨大的优势,但同时也带来了一些挑战。特别是,容忍任务控制器的故障变得非常重要,包括最常见的类型,即拜占庭故障。为了应对这一挑战,我们提出了一种适应这种特定类型系统特征的主动复制方法。我们的解决方案依赖于签名消息,需要N = 2 × f + 1个任务控制器副本来容忍f个拜占庭故障。我们描述了系统模型和实现所需功能所需的机制,并以一种非正式的方式讨论了所建议方法的正确性。此外,我们通过指示性仿真实验来评估原型实现的开销。
{"title":"Byzantine fault tolerance for centrally coordinated missions with unmanned vehicles","authors":"Nasos Grigoropoulos, Manos Koutsoubelias, S. Lalis","doi":"10.1145/3387902.3392622","DOIUrl":"https://doi.org/10.1145/3387902.3392622","url":null,"abstract":"Autonomous unmanned vehicles can support a wide range of missions, which are typically coordinated by a human operator. Automating these missions through a computer program can offer great advantages, but at the same time introduces several challenges. In particular, it becomes important to tolerate failures of the mission controller, including the most general type, namely Byzantine failures. To address this challenge, we propose an active replication approach adapted to the characteristics of this particular type of system. Our solution relies on signed messages and requires N = 2 × f + 1 mission controller replicas to tolerate f Byzantine failures. We describe the system model and the mechanisms that need to be in place to achieve the desired functionality, and argue about the correctness of the proposed approach in an informal way. Also, we evaluate the overheads of a prototype implementation through indicative simulation experiments.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"103 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A runtime system for finite element methods in a partitioned global address space 一个运行时系统的有限元方法在一个分区的全局地址空间
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3392628
Stefan Groth, D. Grünewald, J. Teich, Frank Hannig
With approaching exascale performance, applications in the domain of high-performance computing (HPC) have to scale to an ever-increasing amount of compute nodes. The Global Address Space Programming Interface (GASPI) communication API promises to handle this challenge by providing a highly flexible and efficient programming model in a partitioned global address space (PGAS). Suitable applications targeting supercomputers include the domain of mesh-based solvers for partial differential equations (PDEs) due to their high computational intensity. The implementation of such solvers is highly interdisciplinary, which therefore requires an abstraction of hardware-specific parallelization techniques from developing numerical algorithms. We present an open-source run-time system (RTS) that distributes and parallelizes device-agnostic kernels, which define algorithms on unstructured grids. We describe how the RTS abstracts common parts of iterative solvers and further explain how to parallelize and distribute these components. We further show the efficiency of our approach for several microbenchmarks and an implementation of the discontinuous Galerkin method (DGM). The results show that we can almost completely hide all synchronization overhead and that the RTS only imposes a small computational cost.
随着性能接近百亿亿级,高性能计算(HPC)领域的应用程序必须扩展到不断增加的计算节点数量。全局地址空间编程接口(GASPI)通信API承诺通过在分区的全局地址空间(PGAS)中提供高度灵活和高效的编程模型来处理这一挑战。基于网格的偏微分方程(PDEs)求解由于其高计算强度而适合应用于超级计算机。这种求解器的实现是高度跨学科的,因此需要从开发数值算法中抽象出特定于硬件的并行化技术。我们提出了一个开源的运行时系统(RTS),它分布和并行设备无关的内核,它定义了非结构化网格上的算法。我们描述了RTS如何抽象迭代求解器的公共部分,并进一步解释了如何并行化和分发这些组件。我们进一步展示了我们的方法在几个微基准测试和不连续伽辽金方法(DGM)的实现中的效率。结果表明,我们几乎可以完全隐藏所有同步开销,并且RTS只施加很小的计算成本。
{"title":"A runtime system for finite element methods in a partitioned global address space","authors":"Stefan Groth, D. Grünewald, J. Teich, Frank Hannig","doi":"10.1145/3387902.3392628","DOIUrl":"https://doi.org/10.1145/3387902.3392628","url":null,"abstract":"With approaching exascale performance, applications in the domain of high-performance computing (HPC) have to scale to an ever-increasing amount of compute nodes. The Global Address Space Programming Interface (GASPI) communication API promises to handle this challenge by providing a highly flexible and efficient programming model in a partitioned global address space (PGAS). Suitable applications targeting supercomputers include the domain of mesh-based solvers for partial differential equations (PDEs) due to their high computational intensity. The implementation of such solvers is highly interdisciplinary, which therefore requires an abstraction of hardware-specific parallelization techniques from developing numerical algorithms. We present an open-source run-time system (RTS) that distributes and parallelizes device-agnostic kernels, which define algorithms on unstructured grids. We describe how the RTS abstracts common parts of iterative solvers and further explain how to parallelize and distribute these components. We further show the efficiency of our approach for several microbenchmarks and an implementation of the discontinuous Galerkin method (DGM). The results show that we can almost completely hide all synchronization overhead and that the RTS only imposes a small computational cost.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121474942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of control and sensing interfaces in a photonic integrated chip solution for quantum computing 量子计算光子集成芯片解决方案中的控制和传感接口分析
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3394034
Luca Gemma, M. Bernard, M. Ghulinyan, D. Brunelli
Interest in quantum computing is rapidly growing in the scientific community as such technology could be the key to enable intensive use of machine learning and big data algorithms. Quantum computers can be conceived from basic photonic elements, such as Mach-Zehnder interferometers (MZI), but they still need control mechanisms and sensing elements from traditional VLSI technology. In this study, we present an ongoing study on a potential architecture for these basic photonic circuits. We realized two Photonic Integrated Circuit (PIC) test structures embedding metallic thermistors as phase shifters and silicon photodiodes as output detectors. We present a complete characterization of the phase shifter elements for an effective on-chip PIC interaction. To induce a consistent phase shift still retaining coherence of light, we act on the phase-shifters by means of a closed-loop control. By controlling through Pulse-Width Modulation the phase shifters, we drive the path of photons accurately in the PIC, demonstrating the effectiveness of the proposed configuration for the management of a photonic chip.
科学界对量子计算的兴趣正在迅速增长,因为这种技术可能是实现机器学习和大数据算法密集使用的关键。量子计算机可以从基本的光子元件(如马赫-曾德干涉仪(MZI))中构想出来,但它们仍然需要传统VLSI技术中的控制机制和传感元件。在这项研究中,我们提出了一项正在进行的关于这些基本光子电路的潜在结构的研究。我们实现了两个光子集成电路(PIC)测试结构,其中金属热敏电阻作为移相器,硅光电二极管作为输出检测器。我们提出了一个完整的表征相移器元件有效的片上PIC相互作用。为了使相移保持光的相干性,我们通过闭环控制作用于相移器。通过脉宽调制控制移相器,我们在PIC中精确地驱动光子的路径,证明了所提出的配置对于光子芯片管理的有效性。
{"title":"Analysis of control and sensing interfaces in a photonic integrated chip solution for quantum computing","authors":"Luca Gemma, M. Bernard, M. Ghulinyan, D. Brunelli","doi":"10.1145/3387902.3394034","DOIUrl":"https://doi.org/10.1145/3387902.3394034","url":null,"abstract":"Interest in quantum computing is rapidly growing in the scientific community as such technology could be the key to enable intensive use of machine learning and big data algorithms. Quantum computers can be conceived from basic photonic elements, such as Mach-Zehnder interferometers (MZI), but they still need control mechanisms and sensing elements from traditional VLSI technology. In this study, we present an ongoing study on a potential architecture for these basic photonic circuits. We realized two Photonic Integrated Circuit (PIC) test structures embedding metallic thermistors as phase shifters and silicon photodiodes as output detectors. We present a complete characterization of the phase shifter elements for an effective on-chip PIC interaction. To induce a consistent phase shift still retaining coherence of light, we act on the phase-shifters by means of a closed-loop control. By controlling through Pulse-Width Modulation the phase shifters, we drive the path of photons accurately in the PIC, demonstrating the effectiveness of the proposed configuration for the management of a photonic chip.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123809104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive entropy coding method for stream-based lossless data compression 基于流的无损数据压缩自适应熵编码方法
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3394037
S. Yamagiwa, Eisaku Hayakawa, Koichi Marumo
High performance lossless data compression is an emerged technology that enhances fast and effective data processing such as for communication and for storage applications. The recent devices generate continuous data flow at high rate, that is very fast stream data. Therefore, an elegant hardware-based compression technology is demanded. This paper proposes a lossless data compression called ASE coding. It encodes stream data by applying entropy coding approach. The encoding mechanism works as a lossless data compression. ASE coding instantly assigns the fewest bits to the corresponding compressed data according to the number of occupied entries in a look-up table. This paper shows the performance evaluations to promise ASE coding adaptively shrinks stream data and works on small hardware resources without stalling or buffering.
高性能无损数据压缩是一项新兴的技术,它可以增强通信和存储等应用的快速有效的数据处理。最近的设备以高速率产生连续的数据流,即非常快的流数据。因此,需要一种优雅的基于硬件的压缩技术。本文提出了一种无损数据压缩方法——ASE编码。它采用熵编码方法对流数据进行编码。编码机制作为无损数据压缩工作。ASE编码根据查找表中占用的条目数立即将最少的位分配给相应的压缩数据。本文展示了性能评估,以保证ASE编码自适应地缩小流数据,并在小型硬件资源上工作,而不会延迟或缓冲。
{"title":"Adaptive entropy coding method for stream-based lossless data compression","authors":"S. Yamagiwa, Eisaku Hayakawa, Koichi Marumo","doi":"10.1145/3387902.3394037","DOIUrl":"https://doi.org/10.1145/3387902.3394037","url":null,"abstract":"High performance lossless data compression is an emerged technology that enhances fast and effective data processing such as for communication and for storage applications. The recent devices generate continuous data flow at high rate, that is very fast stream data. Therefore, an elegant hardware-based compression technology is demanded. This paper proposes a lossless data compression called ASE coding. It encodes stream data by applying entropy coding approach. The encoding mechanism works as a lossless data compression. ASE coding instantly assigns the fewest bits to the corresponding compressed data according to the number of occupied entries in a look-up table. This paper shows the performance evaluations to promise ASE coding adaptively shrinks stream data and works on small hardware resources without stalling or buffering.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High-level synthesis of throughput-optimized and energy-efficient approximate designs 高水平综合吞吐量优化和节能近似设计
Pub Date : 2020-05-11 DOI: 10.1145/3387902.3394039
Marcos T. Leipnitz, G. Nazar
Approximate accelerators for throughput-demanding error-resilient kernels can be a solution to meet design requirements with acceptable deviation from the exact implementation. However, handcrafting approximate accelerators may impose prohibitive development time and cost overheads. In this scenario, approximate High-Level Synthesis (HLS) has been proposed to deal with the increased design complexity. Nevertheless, current tools are not suitable for exploring throughput optimizations, being instead constrained to perform specific improvements on area, power, and average performance. In this work, we propose the use of HLS to generate Pareto-optimal accelerators for applications facing throughput constraints. We present an approximate HLS tool able to improve the throughput of such accelerators by up to 80% with no additional area costs, while introducing manageable error for most applications.
对于吞吐量要求高的容错核来说,近似加速器是一种解决方案,可以在与精确实现有可接受偏差的情况下满足设计要求。然而,手工制作近似加速器可能会带来令人望而却步的开发时间和成本开销。在这种情况下,提出了近似的高级综合(HLS)来处理增加的设计复杂性。然而,目前的工具并不适合探索吞吐量优化,而是被限制在面积、功率和平均性能上执行特定的改进。在这项工作中,我们建议使用HLS为面临吞吐量限制的应用程序生成帕累托最优加速器。我们提出了一种近似的HLS工具,能够在不增加额外面积成本的情况下将此类加速器的吞吐量提高80%,同时为大多数应用程序引入可管理的错误。
{"title":"High-level synthesis of throughput-optimized and energy-efficient approximate designs","authors":"Marcos T. Leipnitz, G. Nazar","doi":"10.1145/3387902.3394039","DOIUrl":"https://doi.org/10.1145/3387902.3394039","url":null,"abstract":"Approximate accelerators for throughput-demanding error-resilient kernels can be a solution to meet design requirements with acceptable deviation from the exact implementation. However, handcrafting approximate accelerators may impose prohibitive development time and cost overheads. In this scenario, approximate High-Level Synthesis (HLS) has been proposed to deal with the increased design complexity. Nevertheless, current tools are not suitable for exploring throughput optimizations, being instead constrained to perform specific improvements on area, power, and average performance. In this work, we propose the use of HLS to generate Pareto-optimal accelerators for applications facing throughput constraints. We present an approximate HLS tool able to improve the throughput of such accelerators by up to 80% with no additional area costs, while introducing manageable error for most applications.","PeriodicalId":155089,"journal":{"name":"Proceedings of the 17th ACM International Conference on Computing Frontiers","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121864236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 17th ACM International Conference on Computing Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1