首页 > 最新文献

2010 10th International Conference on Application of Concurrency to System Design最新文献

英文 中文
Automated Synthesis of Instruction Codes in the Context of Micro-architecture Design 微架构设计中指令码的自动合成
A. Mokhov, A. Alekseyev, A. Yakovlev
There is a critical need for design automation in micro architectural modelling and synthesis. One of the areas which lacks the necessary automation support is synthesis of instruction codes targeting various design optimality criteria. This paper aims to fill this gap by providing a formal method and software tool for synthesis of instruction codes given the description of a processor as a set of instructions. The method is based on the Conditional Partial Order Graph (CPOG) model introduced recently, which is a formalism for efficient specification and synthesis of microcontrol circuits. It describes a system as a functional composition of its behavioural scenarios, or instructions, each of them being a partial order of events. In order to distinguish instructions within a CPOG they are given different encodings represented with Boolean vectors. Size and latency of the final microcontroller significantly depends on the chosen encodings, thus efficient synthesis of instruction codes is essential. This paper presents a method for optimal encoding of a given set of partial orders so that a CPOG containing all of them has the minimum complexity, thereby leading to the smallest and fastest controller.
在微建筑建模和综合中,设计自动化是一个迫切的需求。其中一个缺乏必要的自动化支持的领域是针对各种设计最优性标准的指令代码的综合。本文旨在通过提供一种形式化的方法和软件工具来填补这一空白,该方法和软件工具用于将处理器描述为一组指令来合成指令代码。该方法基于最近提出的条件偏序图(CPOG)模型,该模型是一种有效规范和综合微控制电路的形式化方法。它将系统描述为其行为场景或指令的功能组合,其中每个场景或指令都是事件的部分顺序。为了区分CPOG中的指令,它们被赋予用布尔向量表示的不同编码。最终微控制器的大小和延迟很大程度上取决于所选择的编码,因此有效的合成指令码是必不可少的。本文提出了一种对给定的部分阶集进行最优编码的方法,使包含所有部分阶的CPOG具有最小的复杂度,从而得到最小和最快的控制器。
{"title":"Automated Synthesis of Instruction Codes in the Context of Micro-architecture Design","authors":"A. Mokhov, A. Alekseyev, A. Yakovlev","doi":"10.1109/ACSD.2010.30","DOIUrl":"https://doi.org/10.1109/ACSD.2010.30","url":null,"abstract":"There is a critical need for design automation in micro architectural modelling and synthesis. One of the areas which lacks the necessary automation support is synthesis of instruction codes targeting various design optimality criteria. This paper aims to fill this gap by providing a formal method and software tool for synthesis of instruction codes given the description of a processor as a set of instructions. The method is based on the Conditional Partial Order Graph (CPOG) model introduced recently, which is a formalism for efficient specification and synthesis of microcontrol circuits. It describes a system as a functional composition of its behavioural scenarios, or instructions, each of them being a partial order of events. In order to distinguish instructions within a CPOG they are given different encodings represented with Boolean vectors. Size and latency of the final microcontroller significantly depends on the chosen encodings, thus efficient synthesis of instruction codes is essential. This paper presents a method for optimal encoding of a given set of partial orders so that a CPOG containing all of them has the minimum complexity, thereby leading to the smallest and fastest controller.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125847788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Asynchronous Routing Algorithm for Clos Networks Clos网络的异步路由算法
Wei Song, D. Edwards
Clos networks provide the theoretically optimal solution to build high-radix switches. This paper proposes a novel asynchronous routing algorithm for general asynchronous three-stage Clos networks. As the major sub-algorithm controlling the first two stages, the asynchronous dispatching algorithm outperforms the synchronous concurrent round-robin dispatching algorithm in behaviour level simulations. In a 32-port Clos network utilizing the asynchronous routing algorithm, paths are reserved in 6.2 ns and released in 3.9 ns.
Clos网络为构建高基数交换机提供了理论上最优的解决方案。针对一般异步三级Clos网络,提出了一种新的异步路由算法。异步调度算法作为控制前两个阶段的主要子算法,在行为级仿真中优于同步并发轮询调度算法。在采用异步路由算法的32端口Clos网络中,路径保留时间为6.2 ns,释放时间为3.9 ns。
{"title":"An Asynchronous Routing Algorithm for Clos Networks","authors":"Wei Song, D. Edwards","doi":"10.1109/ACSD.2010.12","DOIUrl":"https://doi.org/10.1109/ACSD.2010.12","url":null,"abstract":"Clos networks provide the theoretically optimal solution to build high-radix switches. This paper proposes a novel asynchronous routing algorithm for general asynchronous three-stage Clos networks. As the major sub-algorithm controlling the first two stages, the asynchronous dispatching algorithm outperforms the synchronous concurrent round-robin dispatching algorithm in behaviour level simulations. In a 32-port Clos network utilizing the asynchronous routing algorithm, paths are reserved in 6.2 ns and released in 3.9 ns.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"621 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116210989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Faster Software Synthesis Using Actor Elimination Techniques for Polychronous Formalism 使用Actor消除技术的多时间形式更快的软件合成
B. Jose, Jason Pribble, S. Shukla
A visual polychronous formalism called Multi-Rate Instantaneous Channel Connected Data Flow (MRICDF)was developed in [1]. In [2], a visual environment called EmCodeSyn was introduced which performs software synthesis from MRICDF models. The synthesis technique replaced clock calculus technique germane to previous polychronous approaches such as SIGNAL with a top down technique based on computing the Prime Implicates (PI) of set of Boolean constraints. This Prime Implicate based method first determines a totally ordered sequence of global synchronization points for all the computation, and then gradually determines if certain computations can synchronize less often. The sequence of global synchronization points are identified by subsequent changes in one of the signals in the system and it is called a master trigger. As opposed to bottom-up clock calculus this method can detect sequential non-implement ability faster. However, the PI computation time increases with the number of variables in the Boolean equations, which in turn increases with the size of the MRICDF network. For faster synthesis, we propose an actor elimination technique that enables reduction of the size of the PI computation problem while preserving the master trigger. Hence it provides a sound and complete abstraction technique for faster determination of sequential implement ability of an MRICDF based model.
在[1]中开发了一种称为多速率瞬时通道连接数据流(MRICDF)的可视化多时间形式。在[2]中,引入了一个名为EmCodeSyn的可视化环境,该环境从MRICDF模型进行软件合成。该综合技术以一种基于布尔约束集的素数隐含(PI)计算的自顶向下技术取代了与先前的多时方法(如SIGNAL)相关的时钟演算技术。这种基于Prime Implicate的方法首先确定所有计算的全局同步点的完全有序序列,然后逐渐确定某些计算是否可以较少地同步。全局同步点序列由系统中某个信号的后续变化来确定,称为主触发器。相对于自底向上的时钟演算,该方法可以更快地检测顺序非实现能力。然而,PI计算时间随着布尔方程中变量数量的增加而增加,而变量数量又随着MRICDF网络规模的增加而增加。为了更快的合成,我们提出了一种actor消除技术,可以减少PI计算问题的大小,同时保留主触发器。因此,它为更快地确定基于MRICDF的模型的顺序实现能力提供了一种完善的抽象技术。
{"title":"Faster Software Synthesis Using Actor Elimination Techniques for Polychronous Formalism","authors":"B. Jose, Jason Pribble, S. Shukla","doi":"10.1109/ACSD.2010.31","DOIUrl":"https://doi.org/10.1109/ACSD.2010.31","url":null,"abstract":"A visual polychronous formalism called Multi-Rate Instantaneous Channel Connected Data Flow (MRICDF)was developed in [1]. In [2], a visual environment called EmCodeSyn was introduced which performs software synthesis from MRICDF models. The synthesis technique replaced clock calculus technique germane to previous polychronous approaches such as SIGNAL with a top down technique based on computing the Prime Implicates (PI) of set of Boolean constraints. This Prime Implicate based method first determines a totally ordered sequence of global synchronization points for all the computation, and then gradually determines if certain computations can synchronize less often. The sequence of global synchronization points are identified by subsequent changes in one of the signals in the system and it is called a master trigger. As opposed to bottom-up clock calculus this method can detect sequential non-implement ability faster. However, the PI computation time increases with the number of variables in the Boolean equations, which in turn increases with the size of the MRICDF network. For faster synthesis, we propose an actor elimination technique that enables reduction of the size of the PI computation problem while preserving the master trigger. Hence it provides a sound and complete abstraction technique for faster determination of sequential implement ability of an MRICDF based model.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Efficient Model Checking of PSL Safety Properties PSL安全性能的有效模型校核
Pub Date : 2010-06-21 DOI: 10.1049/iet-cdt.2010.0154
Tuomas Kuismin, Keijo Heljanko, Tommi A. Junttila
Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language. The approach can also be used as a sound but incomplete bug hunting tool for general(non-safety) PSL properties, and it will detect exactly the finite counterexamples that are the informative bad prefixes for the PSL formulas in question. The presented technique is inspired by the temporal testers approach of Pnueli and co-authors but is aimed at finite words instead of infinite words. The new approach presented in this paper handles a larger syntactic subset of PSL safety properties than earlier translations for PSL safety subsets and has been implemented on top of the open source NuSMV 2model checker. The experimental results show the approach to be a quite competitive model checking approach when compared to a state-of-the-art implementation of PSL model checking.
安全属性是一类重要的属性,因为在工业使用的模型检查中,大部分要检查的属性都是安全属性。这项工作提出了一种有效的方法来模型检查用PSL (IEEE标准1850属性规范语言)表示的安全属性,PSL是一种工业属性规范语言。该方法还可以用作一般(非安全)PSL属性的可靠但不完整的bug搜索工具,并且它将准确地检测有限的反例,这些反例是所讨论的PSL公式的信息错误前缀。该方法受Pnueli及其合作者的时间测试方法的启发,但针对的是有限的单词而不是无限的单词。本文提出的新方法处理的PSL安全属性的语法子集比早期PSL安全子集的翻译要大,并且已经在开源的NuSMV 2模型检查器上实现。实验结果表明,与最先进的PSL模型检查实现相比,该方法是一种相当有竞争力的模型检查方法。
{"title":"Efficient Model Checking of PSL Safety Properties","authors":"Tuomas Kuismin, Keijo Heljanko, Tommi A. Junttila","doi":"10.1049/iet-cdt.2010.0154","DOIUrl":"https://doi.org/10.1049/iet-cdt.2010.0154","url":null,"abstract":"Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. This work presents an efficient approach to model check safety properties expressed in PSL (IEEE Std 1850 Property Specification Language), an industrial property specification language. The approach can also be used as a sound but incomplete bug hunting tool for general(non-safety) PSL properties, and it will detect exactly the finite counterexamples that are the informative bad prefixes for the PSL formulas in question. The presented technique is inspired by the temporal testers approach of Pnueli and co-authors but is aimed at finite words instead of infinite words. The new approach presented in this paper handles a larger syntactic subset of PSL safety properties than earlier translations for PSL safety subsets and has been implemented on top of the open source NuSMV 2model checker. The experimental results show the approach to be a quite competitive model checking approach when compared to a state-of-the-art implementation of PSL model checking.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115823361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Complete Synthesis Method for Block-Level Relaxation in Self-Timed Datapaths 自定时数据路径中块级松弛的完全综合方法
W. Toms, D. A. Edwards
Self-timed circuits present an attractive solution to the problem of process variation. However, implementing self-timed combinational logic can be complex and expensive. This paper presents a complete synthesis flow that generates self-timed combinational networks from conventional Boolean networks. The Boolean network is partitioned into small function blocks which are then synthesised using self-timed techniques. The procedure employs relaxation optimisations to distribute the overheads associated with self-timed networks between function-blocks. Relaxation is incorporated into the function block synthesis procedures, meaning the optimisations can be applied at a much finer granularity than previously possible. The new techniques are demonstrated on a range of benchmarks showing average reduction of 5% in area, 26% in latency and 48% in energy over gate-level relaxation techniques and 17% in area, 8% in latency and 20% in energy consumption over other block-level relaxation techniques.
自定时电路是解决工艺变化问题的一种有吸引力的方法。然而,实现自定时组合逻辑可能是复杂和昂贵的。本文给出了一个由传统布尔网络生成自定时组合网络的完整合成流程。布尔网络被划分成小的功能块,然后使用自定时技术进行合成。该过程使用松弛优化来分配与功能块之间的自定时网络相关的开销。松弛被整合到功能块合成过程中,这意味着优化可以在比以前更细的粒度上应用。新技术在一系列基准测试中得到了证明,与门级弛豫技术相比,平均减少了5%的面积、26%的延迟和48%的能量,与其他块级弛豫技术相比,平均减少了17%的面积、8%的延迟和20%的能量消耗。
{"title":"A Complete Synthesis Method for Block-Level Relaxation in Self-Timed Datapaths","authors":"W. Toms, D. A. Edwards","doi":"10.1109/ACSD.2010.29","DOIUrl":"https://doi.org/10.1109/ACSD.2010.29","url":null,"abstract":"Self-timed circuits present an attractive solution to the problem of process variation. However, implementing self-timed combinational logic can be complex and expensive. This paper presents a complete synthesis flow that generates self-timed combinational networks from conventional Boolean networks. The Boolean network is partitioned into small function blocks which are then synthesised using self-timed techniques. The procedure employs relaxation optimisations to distribute the overheads associated with self-timed networks between function-blocks. Relaxation is incorporated into the function block synthesis procedures, meaning the optimisations can be applied at a much finer granularity than previously possible. The new techniques are demonstrated on a range of benchmarks showing average reduction of 5% in area, 26% in latency and 48% in energy over gate-level relaxation techniques and 17% in area, 8% in latency and 20% in energy consumption over other block-level relaxation techniques.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125769502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Order-Independence of Vector-Based Transition Systems 基于矢量的转换系统的序无关性
M. Raffelsieper, M. Mousavi, H. Zantema
Semantics of many specification languages, particularly those used in the domain of hardware, is described in terms of vector-based transition systems. In such a transition system, each macro-step transition is labeled by a vector of inputs. When performing a macro-step, several inputs may potentially change. Each macro-step can thus be decomposed in a number of micro-steps, taking one input change at a time into account. This is akin to an interleaving semantics, where a concurrent step is represented by an interleaving of its constituting components. We present criteria on vector-based transition systems, which guarantee that the next state computation is independent of the order in which these micro-steps are executed. If our criteria are satisfied by the semantic definition of a certain specification, then its state-space generation or exploration algorithm needs to only consider one representative among all possible permutations of such micro-steps. We demonstrate the applicability of our criteria to the specification of transistor netlists.
许多规范语言的语义,特别是那些在硬件领域使用的语言,是根据基于向量的转换系统来描述的。在这样的转换系统中,每个宏步骤转换由输入向量标记。在执行宏步骤时,几个输入可能会发生变化。因此,每个宏步骤可以分解为许多微步骤,每次考虑一个输入变化。这类似于交错语义,其中并发步骤由其组成组件的交错表示。我们提出了基于向量的转移系统的准则,保证了下一个状态计算与这些微步骤的执行顺序无关。如果我们的标准满足某个规范的语义定义,那么它的状态空间生成或探索算法只需要在这些微步骤的所有可能排列中考虑一个代表。我们证明了我们的标准对晶体管网表规格的适用性。
{"title":"Order-Independence of Vector-Based Transition Systems","authors":"M. Raffelsieper, M. Mousavi, H. Zantema","doi":"10.1109/ACSD.2010.24","DOIUrl":"https://doi.org/10.1109/ACSD.2010.24","url":null,"abstract":"Semantics of many specification languages, particularly those used in the domain of hardware, is described in terms of vector-based transition systems. In such a transition system, each macro-step transition is labeled by a vector of inputs. When performing a macro-step, several inputs may potentially change. Each macro-step can thus be decomposed in a number of micro-steps, taking one input change at a time into account. This is akin to an interleaving semantics, where a concurrent step is represented by an interleaving of its constituting components. We present criteria on vector-based transition systems, which guarantee that the next state computation is independent of the order in which these micro-steps are executed. If our criteria are satisfied by the semantic definition of a certain specification, then its state-space generation or exploration algorithm needs to only consider one representative among all possible permutations of such micro-steps. We demonstrate the applicability of our criteria to the specification of transistor netlists.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Formal Semantics of Clock Refinement in Imperative Synchronous Languages 命令式同步语言中时钟细化的形式语义
Mike Gemünde, J. Brandt, K. Schneider
The synchronous model of computation divides the execution of a program into an infinite sequence of so-called macro steps, which are further divided into finitely many micro steps. Since all threads of a program are forced to run in lockstep, programmers have no means to express the independence of parallel threads, which leads to a phenomenon called over-synchronization. In this paper, we therefore propose a generalization of the synchronous model of computation by means of refined clocks, which divide a macro step into finer grained steps that themselves consist of micro steps. In particular, we present a structural operational semantics of sub clocks and prove that the internal asynchrony given by sub clocks still preserves input/output determinism.
同步计算模型将程序的执行划分为无限个所谓的宏步骤序列,这些宏步骤又进一步划分为有限个微步骤。由于程序的所有线程都被迫步调一致地运行,程序员没有办法表达并行线程的独立性,这导致了一种称为过度同步的现象。因此,在本文中,我们提出了一种通过精细时钟来推广同步计算模型的方法,它将宏观步骤划分为更细粒度的步骤,这些步骤本身由微步骤组成。特别地,我们提出了子时钟的结构操作语义,并证明了子时钟给出的内部异步仍然保持输入/输出确定性。
{"title":"A Formal Semantics of Clock Refinement in Imperative Synchronous Languages","authors":"Mike Gemünde, J. Brandt, K. Schneider","doi":"10.1109/ACSD.2010.25","DOIUrl":"https://doi.org/10.1109/ACSD.2010.25","url":null,"abstract":"The synchronous model of computation divides the execution of a program into an infinite sequence of so-called macro steps, which are further divided into finitely many micro steps. Since all threads of a program are forced to run in lockstep, programmers have no means to express the independence of parallel threads, which leads to a phenomenon called over-synchronization. In this paper, we therefore propose a generalization of the synchronous model of computation by means of refined clocks, which divide a macro step into finer grained steps that themselves consist of micro steps. In particular, we present a structural operational semantics of sub clocks and prove that the internal asynchrony given by sub clocks still preserves input/output determinism.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123370670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Model Checking View to Clock Gating and Operand Isolation 时钟门控和操作数隔离的模型检查视图
J. Brandt, K. Schneider, Sumit Ahuja, S. Shukla
Clock gating and operand isolation are two techniques to reduce the power consumption in state-of-the-art hardware designs. Both approaches basically follow a two-step procedure: first, they statically analyze a hardware circuit to determine irrelevant computations. Second, all parts which are responsible for these computations are replaced by others that consume less power in the average case, either by dynamically gating clocks or by isolating operands. This paper focuses on the first phase, i.e. the computation of irrelevant computation. The core of our contribution is the definition of so-called passiveness conditions for each signal x, which indicate that the value currently carried by x does not contribute to the final result of the system. After showing how our theory can be generally used in the context of clock gating and operand isolation, we classify many state-of-the-art approaches and show that they are in fact conservative approximations of our general setting. Thereby, it defines the theoretical basis for adoption of these approaches in their entirety.
时钟门控和操作数隔离是在最先进的硬件设计中降低功耗的两种技术。这两种方法基本上都遵循两个步骤:首先,它们静态分析硬件电路以确定不相关的计算。其次,通过动态门控时钟或隔离操作数,所有负责这些计算的部分都被其他在平均情况下消耗更少功率的部分所取代。本文主要研究第一阶段,即不相关计算的计算。我们贡献的核心是定义了每个信号x的所谓无源条件,即x当前携带的值对系统的最终结果没有贡献。在展示了我们的理论如何在时钟门控和操作数隔离的背景下普遍使用之后,我们对许多最先进的方法进行了分类,并表明它们实际上是我们一般设置的保守近似。从而为全面采用这些方法确定了理论基础。
{"title":"The Model Checking View to Clock Gating and Operand Isolation","authors":"J. Brandt, K. Schneider, Sumit Ahuja, S. Shukla","doi":"10.1109/ACSD.2010.22","DOIUrl":"https://doi.org/10.1109/ACSD.2010.22","url":null,"abstract":"Clock gating and operand isolation are two techniques to reduce the power consumption in state-of-the-art hardware designs. Both approaches basically follow a two-step procedure: first, they statically analyze a hardware circuit to determine irrelevant computations. Second, all parts which are responsible for these computations are replaced by others that consume less power in the average case, either by dynamically gating clocks or by isolating operands. This paper focuses on the first phase, i.e. the computation of irrelevant computation. The core of our contribution is the definition of so-called passiveness conditions for each signal x, which indicate that the value currently carried by x does not contribute to the final result of the system. After showing how our theory can be generally used in the context of clock gating and operand isolation, we classify many state-of-the-art approaches and show that they are in fact conservative approximations of our general setting. Thereby, it defines the theoretical basis for adoption of these approaches in their entirety.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116444452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach 面向并发程序的自适应入侵检测系统:一种基于Petri网的方法
Jean-Baptiste Voron, Clément Démoulins, F. Kordon
Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities. However, the construction of such a security system is a delicate process involving: (i) the acquisition of the monitored program behavior and its storage in a compact way, (ii) the generation of a monitor detecting deviances in the program behavior. These problems are emphasized when dealing with complex or parallel programs. This paper presents a new approach to automatically generate a dedicated and customized IDS from C sources targeting multi-threaded programs. We use Petri Nets to benefit from a formal description able to compactly describe parallel behaviors. Obtained models can then be enhanced with extra requirements such as resources usage limits or temporal execution bounds by means of observers. We illustrate the benefits of our approach on a recent class of attacks targeting web servers.
入侵检测系统(IDS)是应对越来越多利用软件漏洞的攻击的一种方法。然而,这样一个安全系统的构建是一个微妙的过程,涉及:(i)获取被监控的程序行为并以紧凑的方式存储它,(ii)生成检测程序行为中的异常的监视器。在处理复杂或并行程序时,这些问题尤为突出。本文提出了一种从C源代码自动生成专用自定义IDS的新方法,该方法针对多线程程序。我们使用Petri网受益于能够紧凑地描述并行行为的形式化描述。然后可以使用额外的需求来增强获得的模型,例如通过观察者来实现资源使用限制或时间执行边界。我们在最近针对web服务器的一类攻击中说明了我们的方法的好处。
{"title":"Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: A Petri Net-Based Approach","authors":"Jean-Baptiste Voron, Clément Démoulins, F. Kordon","doi":"10.1109/ACSD.2010.32","DOIUrl":"https://doi.org/10.1109/ACSD.2010.32","url":null,"abstract":"Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities. However, the construction of such a security system is a delicate process involving: (i) the acquisition of the monitored program behavior and its storage in a compact way, (ii) the generation of a monitor detecting deviances in the program behavior. These problems are emphasized when dealing with complex or parallel programs. This paper presents a new approach to automatically generate a dedicated and customized IDS from C sources targeting multi-threaded programs. We use Petri Nets to benefit from a formal description able to compactly describe parallel behaviors. Obtained models can then be enhanced with extra requirements such as resources usage limits or temporal execution bounds by means of observers. We illustrate the benefits of our approach on a recent class of attacks targeting web servers.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121940525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards Performance Evaluation of Mobile Ad Hoc Network Protocols 移动自组网协议性能评价研究
F. Ghassemi, A. Movaghar, W. Fokkink
We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network layers, and the underlying dynamic topology. The link connectivity model, which implicitly models node mobility, specifies link up and down lifetimes. We use so-called constrained labeled multi-transition systems (CLMSs) to specify MANETs, transitions are annotated by network restrictions, capturing the topologies in which a transition is possible. A continuous Markov chain can be generated from a CLMS, to evaluate the performance of the corresponding MANET.
我们提出了一个正式的框架来评估MANET协议的随机特性。它捕获部署在不同网络层的协议的随机行为与底层动态拓扑之间的相互作用。链路连接模型隐式地对节点移动性进行建模,它指定了链路的上行和下行生存期。我们使用所谓的约束标记多转换系统(CLMSs)来指定manet,转换由网络限制注释,捕获可能进行转换的拓扑结构。一个连续的马尔可夫链可以从一个CLMS生成,以评估相应的MANET的性能。
{"title":"Towards Performance Evaluation of Mobile Ad Hoc Network Protocols","authors":"F. Ghassemi, A. Movaghar, W. Fokkink","doi":"10.1109/ACSD.2010.20","DOIUrl":"https://doi.org/10.1109/ACSD.2010.20","url":null,"abstract":"We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network layers, and the underlying dynamic topology. The link connectivity model, which implicitly models node mobility, specifies link up and down lifetimes. We use so-called constrained labeled multi-transition systems (CLMSs) to specify MANETs, transitions are annotated by network restrictions, capturing the topologies in which a transition is possible. A continuous Markov chain can be generated from a CLMS, to evaluate the performance of the corresponding MANET.","PeriodicalId":169191,"journal":{"name":"2010 10th International Conference on Application of Concurrency to System Design","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 10th International Conference on Application of Concurrency to System Design
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1