首页 > 最新文献

2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)最新文献

英文 中文
Energy Optimization in NCFET-based Processors 基于ncfeet处理器的能量优化
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116301
Sami Salamin, Martin Rapp, H. Amrouch, A. Gerstlauer, J. Henkel
Energy consumption is a key optimization goal for all modern processors. Negative Capacitance Field-Effect Transistors (NCFETs) are a leading emerging technology that promises outstanding performance in addition to better energy efficiency. Thickness of the additional ferroelectric layer, frequency, and voltage are the key parameters in NCFET technology that impact the power and frequency of processors. However, their joint impact on energy optimization has not been investigated yet.In this work, we are the first to demonstrate that conventional (i.e., NCFET-unaware) dynamic voltage/frequency scaling (DVFS) techniques to minimize energy are sub-optimal when applied to NCFET-based processors. We further demonstrate that state-of-the-art NCFET-aware voltage scaling for power minimization is also sub-optimal when it comes to energy. This work provides the first NCFET-aware DVFS technique that optimizes the processor's energy through optimal runtime frequency/voltage selection. In NCFETs, energy-optimal frequency and voltage are dependent on the workload and technology parameters. Our NCFET-aware DVFS technique considers these effects to perform optimal voltage/frequency selection at runtime depending on workload characteristics. Results show up to 90 % energy savings compared to conventional DVFS techniques. Compared to state-of-the-art NCFET-aware power management, our technique provides up to 72 % energy savings along with 3.7x higher performance.
能耗是所有现代处理器的关键优化目标。负电容场效应晶体管(ncfet)是一种领先的新兴技术,除了具有更好的能源效率外,还承诺具有出色的性能。附加铁电层的厚度、频率和电压是NCFET技术中影响处理器功率和频率的关键参数。然而,它们对能源优化的共同影响尚未得到研究。在这项工作中,我们首次证明了传统的(即ncfet不知道的)动态电压/频率缩放(DVFS)技术在应用于基于ncfet的处理器时,将能量最小化是次优的。我们进一步证明,在能量方面,最先进的ncfet感知电压缩放功率最小化也是次优的。这项工作提供了第一个ncfet感知的DVFS技术,该技术通过最佳运行频率/电压选择来优化处理器的能量。在ncfet中,能量最优频率和电压取决于工作负载和技术参数。我们的ncfet感知DVFS技术考虑这些影响,根据工作负载特性在运行时执行最佳电压/频率选择。结果表明,与传统的DVFS技术相比,可节省高达90%的能源。与最先进的ncfet感知电源管理相比,我们的技术可节省高达72%的能源,同时性能提高3.7倍。
{"title":"Energy Optimization in NCFET-based Processors","authors":"Sami Salamin, Martin Rapp, H. Amrouch, A. Gerstlauer, J. Henkel","doi":"10.23919/DATE48585.2020.9116301","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116301","url":null,"abstract":"Energy consumption is a key optimization goal for all modern processors. Negative Capacitance Field-Effect Transistors (NCFETs) are a leading emerging technology that promises outstanding performance in addition to better energy efficiency. Thickness of the additional ferroelectric layer, frequency, and voltage are the key parameters in NCFET technology that impact the power and frequency of processors. However, their joint impact on energy optimization has not been investigated yet.In this work, we are the first to demonstrate that conventional (i.e., NCFET-unaware) dynamic voltage/frequency scaling (DVFS) techniques to minimize energy are sub-optimal when applied to NCFET-based processors. We further demonstrate that state-of-the-art NCFET-aware voltage scaling for power minimization is also sub-optimal when it comes to energy. This work provides the first NCFET-aware DVFS technique that optimizes the processor's energy through optimal runtime frequency/voltage selection. In NCFETs, energy-optimal frequency and voltage are dependent on the workload and technology parameters. Our NCFET-aware DVFS technique considers these effects to perform optimal voltage/frequency selection at runtime depending on workload characteristics. Results show up to 90 % energy savings compared to conventional DVFS techniques. Compared to state-of-the-art NCFET-aware power management, our technique provides up to 72 % energy savings along with 3.7x higher performance.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
XGBIR: An XGBoost-based IR Drop Predictor for Power Delivery Network 基于xgboost的输电网红外下降预测器
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116327
C. Pao, An-Yu Su, Yu-Min Lee
This work utilizes the XGBoost to build a machine-learning-based IR drop predictor, XGBIR, for the power grid. To capture the behavior of power grid, we extract its several features and employ its locality property to save the extraction time. XGBIR can be effectively applied to large designs and the average error of predicted IR drops is less than 6 mV.
这项工作利用XGBoost为电网构建了一个基于机器学习的红外下降预测器XGBIR。为了捕获电网的行为,我们提取了电网的多个特征,并利用其局部性来节省提取时间。XGBIR可以有效地应用于大型设计,预测红外降的平均误差小于6 mV。
{"title":"XGBIR: An XGBoost-based IR Drop Predictor for Power Delivery Network","authors":"C. Pao, An-Yu Su, Yu-Min Lee","doi":"10.23919/DATE48585.2020.9116327","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116327","url":null,"abstract":"This work utilizes the XGBoost to build a machine-learning-based IR drop predictor, XGBIR, for the power grid. To capture the behavior of power grid, we extract its several features and employ its locality property to save the extraction time. XGBIR can be effectively applied to large designs and the average error of predicted IR drops is less than 6 mV.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126660739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Template schedule construction for global real-time scheduling on unrelated multiprocessor platforms 非相关多处理器平台上全局实时调度的模板调度构建
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116409
A. Bertout, J. Goossens, E. Grolleau, Xavier Poczekajlo
The seminal work on the global real-time scheduling of periodic tasks on unrelated multiprocessor platforms is based on a two-step method. First, the workload of each task is distributed over the processors and it is proved that this first step success ensures the existence of a feasible schedule. Then, using this workload assignment as an input, a template schedule construction method is presented. In this work, we review the seminal work and show by using a counter-example that this second step is incomplete. Thus, we propose and prove correct a novel and efficient algorithm to build the template schedule.
不相关多处理器平台上周期性任务全局实时调度的开创性工作是基于两步法的。首先,将每个任务的工作负载分配到处理器上,并证明了这一步的成功确保了可行调度的存在。然后,以工作量分配为输入,提出了一种模板调度构建方法。在这项工作中,我们回顾了开创性的工作,并通过使用一个反例表明,第二步是不完整的。因此,我们提出并证明了一种新的高效的模板调度算法。
{"title":"Template schedule construction for global real-time scheduling on unrelated multiprocessor platforms","authors":"A. Bertout, J. Goossens, E. Grolleau, Xavier Poczekajlo","doi":"10.23919/DATE48585.2020.9116409","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116409","url":null,"abstract":"The seminal work on the global real-time scheduling of periodic tasks on unrelated multiprocessor platforms is based on a two-step method. First, the workload of each task is distributed over the processors and it is proved that this first step success ensures the existence of a feasible schedule. Then, using this workload assignment as an input, a template schedule construction method is presented. In this work, we review the seminal work and show by using a counter-example that this second step is incomplete. Thus, we propose and prove correct a novel and efficient algorithm to build the template schedule.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114532295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware SOLOMON:一种自动检测硬件故障攻击漏洞的框架
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116380
Milind Srivastava, Patanjali Slpsk, Indrani Roy, C. Rebeiro, Aritra Hazra, S. Bhunia
Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only a tiny fraction of the gates is exploitable by such an attack. Finding these vulnerable gates has been a manual and tedious task requiring considerable expertise. In this paper, we propose SOLOMON, the first automatic fault attack vulnerability detection framework for hardware designs. Given a cipher implementation, either at RTL or gate-level, SOLOMON uses formal methods to map vulnerable regions in the cipher algorithm to specific locations in the hardware thus enabling targeted countermeasures to be deployed with much lesser overheads. We demonstrate the efficacy of the SOLOMON framework using three ciphers: AES, CLEFIA, and Simon.
故障攻击是针对加密设备的有效物理攻击。在加密过程中注入的单个错误就可以泄露密码的秘密密钥。在加密算法的硬件实现中,只有很小一部分门可以被这种攻击利用。寻找这些易受攻击的大门是一项手工而乏味的任务,需要相当多的专业知识。本文提出了首个用于硬件设计的故障攻击漏洞自动检测框架SOLOMON。给定一个密码实现,无论是在RTL还是在门级,SOLOMON使用形式化方法将密码算法中的脆弱区域映射到硬件中的特定位置,从而能够以更少的开销部署目标对策。我们使用三个密码:AES、CLEFIA和Simon来证明SOLOMON框架的有效性。
{"title":"SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware","authors":"Milind Srivastava, Patanjali Slpsk, Indrani Roy, C. Rebeiro, Aritra Hazra, S. Bhunia","doi":"10.23919/DATE48585.2020.9116380","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116380","url":null,"abstract":"Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only a tiny fraction of the gates is exploitable by such an attack. Finding these vulnerable gates has been a manual and tedious task requiring considerable expertise. In this paper, we propose SOLOMON, the first automatic fault attack vulnerability detection framework for hardware designs. Given a cipher implementation, either at RTL or gate-level, SOLOMON uses formal methods to map vulnerable regions in the cipher algorithm to specific locations in the hardware thus enabling targeted countermeasures to be deployed with much lesser overheads. We demonstrate the efficacy of the SOLOMON framework using three ciphers: AES, CLEFIA, and Simon.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"647 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multi-Agent Actor-Critic Method for Joint Duty-Cycle and Transmission Power Control 联合占空比与传输功率控制的多智能体actor - critical方法
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116518
Sota Sawaguchi, J. Christmann, A. Molnos, C. Bernier, S. Lesecq
In energy-harvesting Internet of Things (EH-IoT) wireless networks, maintaining energy neutral operation (ENO) is crucial for their perpetual operation and maintenance-free property. Guaranteeing this ENO condition and optimal power-performance trade-off under transient harvested energy and wireless channel quality is particularly challenging. This paper proposes a multi-agent actor-critic reinforcement learning for modulating both the transmitter duty-cycle and output power based on the state-of-buffer (SoB) and the state-of-charge (SoC) information as a state. Thanks to these buffers, differently from the state-of-the-art, our solution does not require any model of the wireless transceiver nor any direct measurement of both harvested energy and wireless channel quality for adapting to these uncertainties. Simulation results of a solar powered EH-IoT node using real-life outdoor solar irradiance data show that the proposed method achieves better performance without system failures throughout a year compared to the state-of-the-art that suffers some system downtime. Our approach also predicts almost no system fails during five years of operation.
在能量收集物联网(EH-IoT)无线网络中,保持能量中性运行(ENO)对于其永久运行和免维护特性至关重要。在瞬时能量收集和无线信道质量下保证这种ENO条件和最佳功率性能权衡是特别具有挑战性的。本文提出了一种基于缓冲状态(SoB)和充电状态(SoC)信息作为状态调制发射机占空比和输出功率的多智能体actor- critical强化学习方法。由于这些缓冲器,与最先进的解决方案不同,我们的解决方案不需要任何型号的无线收发器,也不需要对收集的能量和无线信道质量进行任何直接测量,以适应这些不确定性。使用真实室外太阳辐照度数据的太阳能供电EH-IoT节点的仿真结果表明,与遭受一些系统停机的最先进方法相比,所提出的方法在一年内没有系统故障的情况下实现了更好的性能。我们的方法还预测在5年的运行期间几乎没有系统故障。
{"title":"Multi-Agent Actor-Critic Method for Joint Duty-Cycle and Transmission Power Control","authors":"Sota Sawaguchi, J. Christmann, A. Molnos, C. Bernier, S. Lesecq","doi":"10.23919/DATE48585.2020.9116518","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116518","url":null,"abstract":"In energy-harvesting Internet of Things (EH-IoT) wireless networks, maintaining energy neutral operation (ENO) is crucial for their perpetual operation and maintenance-free property. Guaranteeing this ENO condition and optimal power-performance trade-off under transient harvested energy and wireless channel quality is particularly challenging. This paper proposes a multi-agent actor-critic reinforcement learning for modulating both the transmitter duty-cycle and output power based on the state-of-buffer (SoB) and the state-of-charge (SoC) information as a state. Thanks to these buffers, differently from the state-of-the-art, our solution does not require any model of the wireless transceiver nor any direct measurement of both harvested energy and wireless channel quality for adapting to these uncertainties. Simulation results of a solar powered EH-IoT node using real-life outdoor solar irradiance data show that the proposed method achieves better performance without system failures throughout a year compared to the state-of-the-art that suffers some system downtime. Our approach also predicts almost no system fails during five years of operation.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Overcoming Challenges for Achieving High in-situ Training Accuracy with Emerging Memories 克服利用新兴记忆实现高原位训练准确度的挑战
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116215
Shanshi Huang, Xiaoyu Sun, Xiaochen Peng, Hongwu Jiang, Shimeng Yu
Embedded artificial intelligence (AI) prefers the adaptive learning capability when deployed in the field, thus in- situ training on-chip is required. Emerging non-volatile memories (eNVMs) are of great interests serving as analog synapses in deep neural network (DNN) on-chip acceleration due to its multilevel programmability. However, the asymmetry/nonlinearity in the conductance tuning remains a grand challenge for achieving high in-situ training accuracy. In addition, analog-to-digital converter (ADC) at the edge of the memory array introduces an additional challenge - quantization error for in-memory computing. In this work, we gain new insights and overcome these challenges through an algorithm-hardware co-optimization. We incorporate these hardware non-ideal effects into the DNN propagation and weight update steps. We evaluate on a VGG-like network for CIFAR-10 dataset, and we show that the asymmetry of the conductance tuning is no longer a limiting factor of in-situ training accuracy if exploiting adaptive "momentum" in the weight update rule. Even considering ADC quantization error, in-situ training accuracy could approach software baseline. Our results show much relaxed requirements that enable a variety of eNVMs for DNN acceleration on the embedded AI platforms.
嵌入式人工智能(AI)在现场部署时更倾向于自适应学习能力,因此需要对其进行片上原位训练。新兴的非易失性存储器(envm)由于其多层可编程性,在深度神经网络(DNN)片上加速中作为模拟突触而备受关注。然而,电导调谐中的不对称性/非线性仍然是实现高原位训练精度的巨大挑战。此外,在存储阵列边缘的模数转换器(ADC)带来了额外的挑战-内存计算的量化误差。在这项工作中,我们通过算法-硬件协同优化获得了新的见解并克服了这些挑战。我们将这些硬件非理想效应纳入DNN传播和权值更新步骤中。我们对CIFAR-10数据集在一个类似vgg的网络上进行了评估,结果表明,如果在权重更新规则中利用自适应“动量”,电导调谐的不对称性不再是原位训练精度的限制因素。即使考虑ADC量化误差,现场训练精度也可以接近软件基线。我们的研究结果显示,在嵌入式AI平台上,各种envm的DNN加速要求非常宽松。
{"title":"Overcoming Challenges for Achieving High in-situ Training Accuracy with Emerging Memories","authors":"Shanshi Huang, Xiaoyu Sun, Xiaochen Peng, Hongwu Jiang, Shimeng Yu","doi":"10.23919/DATE48585.2020.9116215","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116215","url":null,"abstract":"Embedded artificial intelligence (AI) prefers the adaptive learning capability when deployed in the field, thus in- situ training on-chip is required. Emerging non-volatile memories (eNVMs) are of great interests serving as analog synapses in deep neural network (DNN) on-chip acceleration due to its multilevel programmability. However, the asymmetry/nonlinearity in the conductance tuning remains a grand challenge for achieving high in-situ training accuracy. In addition, analog-to-digital converter (ADC) at the edge of the memory array introduces an additional challenge - quantization error for in-memory computing. In this work, we gain new insights and overcome these challenges through an algorithm-hardware co-optimization. We incorporate these hardware non-ideal effects into the DNN propagation and weight update steps. We evaluate on a VGG-like network for CIFAR-10 dataset, and we show that the asymmetry of the conductance tuning is no longer a limiting factor of in-situ training accuracy if exploiting adaptive \"momentum\" in the weight update rule. Even considering ADC quantization error, in-situ training accuracy could approach software baseline. Our results show much relaxed requirements that enable a variety of eNVMs for DNN acceleration on the embedded AI platforms.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130008602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
In-Memory Resistive RAM Implementation of Binarized Neural Networks for Medical Applications 用于医疗应用的二值化神经网络的内存电阻性RAM实现
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116439
Bogdan Penkovsky, M. Bocquet, T. Hirtzlin, Jacques-Olivier Klein, E. Nowak, E. Vianello, J. Portal, D. Querlioz
The advent of deep learning has considerably accelerated machine learning development. The deployment of deep neural networks at the edge is however limited by their high memory and energy consumption requirements. With new memory technology available, emerging Binarized Neural Networks (BNNs) are promising to reduce the energy impact of the forthcoming machine learning hardware generation, enabling machine learning on the edge devices and avoiding data transfer over the network. In this work, after presenting our implementation employing a hybrid CMOS - hafnium oxide resistive memory technology, we suggest strategies to apply BNNs to biomedical signals such as electrocardiography and electroencephalography, keeping accuracy level and reducing memory requirements. We investigate the memory-accuracy trade-off when binarizing whole network and binarizing solely the classifier part. We also discuss how these results translate to the edge-oriented Mobilenet V1 neural network on the Imagenet task. The final goal of this research is to enable smart autonomous healthcare devices.
深度学习的出现大大加速了机器学习的发展。然而,边缘深度神经网络的部署受到其高内存和能耗要求的限制。随着新的存储技术的出现,新兴的二值化神经网络(bnn)有望减少即将到来的机器学习硬件产生的能量影响,从而在边缘设备上实现机器学习,并避免通过网络传输数据。在这项工作中,在介绍了我们采用混合CMOS -氧化铪电阻式记忆技术的实现之后,我们提出了将bnn应用于心电图和脑电图等生物医学信号的策略,以保持准确性水平并降低记忆要求。我们研究了二值化整个网络和二值化分类器部分时的记忆-精度权衡。我们还讨论了这些结果如何在Imagenet任务上转化为面向边缘的Mobilenet V1神经网络。本研究的最终目标是实现智能自主医疗保健设备。
{"title":"In-Memory Resistive RAM Implementation of Binarized Neural Networks for Medical Applications","authors":"Bogdan Penkovsky, M. Bocquet, T. Hirtzlin, Jacques-Olivier Klein, E. Nowak, E. Vianello, J. Portal, D. Querlioz","doi":"10.23919/DATE48585.2020.9116439","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116439","url":null,"abstract":"The advent of deep learning has considerably accelerated machine learning development. The deployment of deep neural networks at the edge is however limited by their high memory and energy consumption requirements. With new memory technology available, emerging Binarized Neural Networks (BNNs) are promising to reduce the energy impact of the forthcoming machine learning hardware generation, enabling machine learning on the edge devices and avoiding data transfer over the network. In this work, after presenting our implementation employing a hybrid CMOS - hafnium oxide resistive memory technology, we suggest strategies to apply BNNs to biomedical signals such as electrocardiography and electroencephalography, keeping accuracy level and reducing memory requirements. We investigate the memory-accuracy trade-off when binarizing whole network and binarizing solely the classifier part. We also discuss how these results translate to the edge-oriented Mobilenet V1 neural network on the Imagenet task. The final goal of this research is to enable smart autonomous healthcare devices.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exact DAG-Aware Rewriting 精确的dag感知重写
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116379
Heinz Riener, A. Mishchenko, Mathias Soeken
We present a generic resynthesis framework for optimizing Boolean networks parameterized with a multi-level logic representation, a cut-computation algorithm, and a resynthesis algorithm. The framework allows us to realize powerful optimization algorithms in a plug-and-play fashion. We show the framework’s versatility by composing an exact DAG-aware rewriting engine. Disjoint-support decomposition and SAT-based exact synthesis together with efficient caching strategies enable the algorithm to resynthesize larger parts of the logic. DAGaware rewriting is used to compute the gain of resynthesis while taking the benefit of structural hashing into account.
我们提出了一个通用的重组框架,用于优化布尔网络参数化的多层次逻辑表示,切割计算算法和重组算法。该框架允许我们以即插即用的方式实现强大的优化算法。我们通过编写一个精确的支持dag的重写引擎来展示框架的多功能性。分离支持分解和基于sat的精确合成以及高效的缓存策略使算法能够重新合成更大的逻辑部分。在考虑结构哈希的好处的同时,使用感知重写来计算重合成的增益。
{"title":"Exact DAG-Aware Rewriting","authors":"Heinz Riener, A. Mishchenko, Mathias Soeken","doi":"10.23919/DATE48585.2020.9116379","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116379","url":null,"abstract":"We present a generic resynthesis framework for optimizing Boolean networks parameterized with a multi-level logic representation, a cut-computation algorithm, and a resynthesis algorithm. The framework allows us to realize powerful optimization algorithms in a plug-and-play fashion. We show the framework’s versatility by composing an exact DAG-aware rewriting engine. Disjoint-support decomposition and SAT-based exact synthesis together with efficient caching strategies enable the algorithm to resynthesize larger parts of the logic. DAGaware rewriting is used to compute the gain of resynthesis while taking the benefit of structural hashing into account.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127997810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network Synthesis for Industry 4.0 面向工业4.0的网络综合
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116407
Enrico Fraccaroli, Alan Michael Padovani, D. Quaglia, F. Fummi
Today’s factory machines are ever more connected with SCADA, MES, ERP applications as well as external systems for data analysis. Different types of network architectures must be used for this purpose. For instance, control applications at the lowest level are susceptible to delays and errors while data analysis with machine learning procedures requires to move a large amount of data without real-time constraints. Standard data formats, like Automation Markup Language (AML), have been established to document factory environment, machine placement and network deployment, however, no automatic technique is currently available in the context of Industry 4.0 to choose the best mix of network architectures according to spacial constraints, cost, and performance. We propose to fill this gap by formulating an optimization problem. First of all, spatial and communication requirements are extracted from the AML description. Then, the optimal interconnection of wired or wireless channels is obtained according to application objectives. Finally, this result is back-annotated to AML to be used in the life cycle of the production system. The proposed methodology is described through a small, but complete, smart production plant.
今天的工厂机器与SCADA、MES、ERP应用程序以及用于数据分析的外部系统的连接越来越紧密。为此,必须使用不同类型的网络体系结构。例如,最低级别的控制应用程序容易受到延迟和错误的影响,而使用机器学习过程的数据分析需要在没有实时限制的情况下移动大量数据。标准的数据格式,如自动化标记语言(AML),已经被建立来记录工厂环境、机器放置和网络部署,然而,在工业4.0的背景下,目前还没有自动化技术可以根据空间限制、成本和性能选择网络架构的最佳组合。我们建议通过制定一个优化问题来填补这一空白。首先,从AML描述中提取空间和通信需求。然后,根据应用目标得到有线或无线信道的最优互连。最后,将此结果反向注释为AML,以便在生产系统的生命周期中使用。提出的方法是通过一个小而完整的智能生产工厂来描述的。
{"title":"Network Synthesis for Industry 4.0","authors":"Enrico Fraccaroli, Alan Michael Padovani, D. Quaglia, F. Fummi","doi":"10.23919/DATE48585.2020.9116407","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116407","url":null,"abstract":"Today’s factory machines are ever more connected with SCADA, MES, ERP applications as well as external systems for data analysis. Different types of network architectures must be used for this purpose. For instance, control applications at the lowest level are susceptible to delays and errors while data analysis with machine learning procedures requires to move a large amount of data without real-time constraints. Standard data formats, like Automation Markup Language (AML), have been established to document factory environment, machine placement and network deployment, however, no automatic technique is currently available in the context of Industry 4.0 to choose the best mix of network architectures according to spacial constraints, cost, and performance. We propose to fill this gap by formulating an optimization problem. First of all, spatial and communication requirements are extracted from the AML description. Then, the optimal interconnection of wired or wireless channels is obtained according to application objectives. Finally, this result is back-annotated to AML to be used in the life cycle of the production system. The proposed methodology is described through a small, but complete, smart production plant.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design-flow Methodology for Secure Group Anonymous Authentication 安全组匿名认证的设计流程方法
Pub Date : 2020-03-01 DOI: 10.23919/DATE48585.2020.9116290
R. Agrawal, Lake Bu, Eliakin Del Rosario, M. Kinsy
In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and privacy levels. In many of these systems, the need frequently arises to (i) control the access to services and resources granted to individual devices or components in a context-aware manner and (ii) establish and enforce data sharing policies that preserve the privacy of the critical information on end users. In essence, the need is to authenticate and anonymize an entity or device simultaneously, two seemingly contradictory goals. The design challenge is further complicated by potential security problems, such as man-in-the-middle attacks, hijacked devices, and counterfeits. In this work, we present a system design flow for a trustworthy group anonymous authentication protocol (GAAP), which not only fulfills the desired functionality for authentication and privacy, but also provides strong security guarantees.
在异构分布式系统中,计算设备和软件组件通常来自不同的提供商,具有不同的安全性、信任和隐私级别。在许多这样的系统中,经常需要(i)以上下文感知的方式控制对授予单个设备或组件的服务和资源的访问,以及(ii)建立和执行数据共享策略,以保护最终用户关键信息的隐私。从本质上讲,需要同时对实体或设备进行身份验证和匿名化,这是两个看似矛盾的目标。潜在的安全问题(如中间人攻击、被劫持的设备和假冒产品)使设计挑战进一步复杂化。在这项工作中,我们提出了一个可信组匿名认证协议(GAAP)的系统设计流程,该协议不仅满足了期望的认证和隐私功能,而且提供了强大的安全保证。
{"title":"Design-flow Methodology for Secure Group Anonymous Authentication","authors":"R. Agrawal, Lake Bu, Eliakin Del Rosario, M. Kinsy","doi":"10.23919/DATE48585.2020.9116290","DOIUrl":"https://doi.org/10.23919/DATE48585.2020.9116290","url":null,"abstract":"In heterogeneous distributed systems, computing devices and software components often come from different providers and have different security, trust, and privacy levels. In many of these systems, the need frequently arises to (i) control the access to services and resources granted to individual devices or components in a context-aware manner and (ii) establish and enforce data sharing policies that preserve the privacy of the critical information on end users. In essence, the need is to authenticate and anonymize an entity or device simultaneously, two seemingly contradictory goals. The design challenge is further complicated by potential security problems, such as man-in-the-middle attacks, hijacked devices, and counterfeits. In this work, we present a system design flow for a trustworthy group anonymous authentication protocol (GAAP), which not only fulfills the desired functionality for authentication and privacy, but also provides strong security guarantees.","PeriodicalId":289525,"journal":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1