首页 > 最新文献

Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion最新文献

英文 中文
Computation offloading of acoustic model for client-edge-based speech-recognition: work-in-progress 基于客户端边缘的语音识别声学模型的计算卸载:正在研究中
Young-Min Lee, Joon-Sung Yang
Speech recognition technology combined with artificial intelligence represents a quantum leap more accurate than past pattern recognition methods. And server-based system support for scalability, virtualization and huge amounts of unlimited storage resources that greatly contributed to the improvement of the accuracy of its prediction. However, the implementation of server-oriented reforms led to enormous latency and connectivity problems. Therefore, we propose a novel client-edge speech recognition system to enhance latency by using what we call semi-offloading technology This proposal is promising big performance gains by offloading computing power-dependent tasks to edge nodes and processing throughput-dependent tasks by a client. The merit of semi-offloading as well as a division of workload allows for parallelism and re-ordering among the process. The experimental results show that, 23%~62% improvement in response time.
语音识别技术与人工智能的结合代表了比过去的模式识别方法更准确的巨大飞跃。而基于服务器的系统对可伸缩性、虚拟化和海量无限存储资源的支持,极大地促进了其预测准确性的提高。然而,面向服务器的改革的实现导致了巨大的延迟和连接问题。因此,我们提出了一种新的客户端边缘语音识别系统,通过使用我们所谓的半卸载技术来增强延迟。该建议通过将计算能力相关的任务卸载到边缘节点并由客户端处理吞吐量相关的任务,有望获得巨大的性能提升。半卸载和工作负载划分的优点允许进程之间的并行性和重新排序。实验结果表明,响应时间提高23%~62%。
{"title":"Computation offloading of acoustic model for client-edge-based speech-recognition: work-in-progress","authors":"Young-Min Lee, Joon-Sung Yang","doi":"10.1145/3349569.3351534","DOIUrl":"https://doi.org/10.1145/3349569.3351534","url":null,"abstract":"Speech recognition technology combined with artificial intelligence represents a quantum leap more accurate than past pattern recognition methods. And server-based system support for scalability, virtualization and huge amounts of unlimited storage resources that greatly contributed to the improvement of the accuracy of its prediction. However, the implementation of server-oriented reforms led to enormous latency and connectivity problems. Therefore, we propose a novel client-edge speech recognition system to enhance latency by using what we call semi-offloading technology This proposal is promising big performance gains by offloading computing power-dependent tasks to edge nodes and processing throughput-dependent tasks by a client. The merit of semi-offloading as well as a division of workload allows for parallelism and re-ordering among the process. The experimental results show that, 23%~62% improvement in response time.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"248 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAT to SAT-hard clause translator: work-in-progress SAT to SAT-hard条款翻译:工作在进行中
Rakibul Hassan, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao
Logic obfuscation emerged as an efficient solution to strengthen the security of integrated circuits (ICs) from multiple threats including reverse engineering and intellectual property (IP) theft. Emergence of Boolean Satisfiability (SAT) attacks and its variants have shown to circumvent the security mechanisms such as obfuscation and a plethora of its variants. Considering the size of ICs and the amount of time it takes to validate a defense i.e., obfuscation against SAT attack could range from few ms to days. In contrast, our current work focuses on devising an iterative, dynamic and intelligent SAT-hard clause generator for a given SAT-prone problem. The proposed Machine Learning (ML)-based SAT to unSAT clause translator is a SAT-hard clause generator that utilizes a bipartite propagation based neural network model. The utilized model comprises multiple layers of artificial neural networks to extract the dependencies of literals and variables, followed by long short term memory (LSTM) networks to validate the SAT hardness. The proposed ML-based SAT to unSAT clause translator is trained with conjunctive normal form (CNF) of the IC netlist that are both SAT solvable and SAT-hard. Further, the model is also trained to convert a CNF from satisfiable (SAT) to unsatisfiable (unSAT) form with minor perturbation (which translates to minor overheads) so that the SAT-attack cannot decrypt the keys. To the best of our knowledge, no previous work has been reported on neural network based SAT-hard clause or CNF translator for circuit obfuscation. We evaluate our proposed models's empirical performance against MiniSAT with 300 CNFs.
逻辑混淆是一种有效的解决方案,可以加强集成电路(ic)的安全性,抵御多种威胁,包括逆向工程和知识产权(IP)盗窃。布尔可满足性(SAT)攻击及其变体的出现已经证明可以绕过安全机制,如混淆和其变体的过剩。考虑到ic的大小和验证防御所需的时间,例如,针对SAT攻击的混淆可能从几毫秒到几天不等。相比之下,我们目前的工作重点是设计一个迭代的、动态的、智能的sat困难子句生成器,用于给定的sat容易出现的问题。本文提出的基于机器学习(ML)的SAT到unSAT子句转换器是一个SAT硬子句生成器,它利用了基于二部传播的神经网络模型。该模型由多层人工神经网络组成,用于提取文字和变量之间的依赖关系,然后使用长短期记忆(LSTM)网络来验证SAT的硬度。本文提出的基于ml的SAT到unSAT的子句翻译器是用可解和难解的IC网络表的合取范式(CNF)进行训练的。此外,该模型还经过训练,可以将CNF从可满足(SAT)形式转换为不可满足(unSAT)形式,并且具有较小的扰动(转换为较小的开销),以便SAT攻击无法解密密钥。据我们所知,以前没有关于基于神经网络的SAT-hard子句或CNF转换器的电路混淆的工作报道。我们用300个cnf来评估我们提出的模型对MiniSAT的经验性能。
{"title":"SAT to SAT-hard clause translator: work-in-progress","authors":"Rakibul Hassan, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao","doi":"10.1145/3349569.3351542","DOIUrl":"https://doi.org/10.1145/3349569.3351542","url":null,"abstract":"Logic obfuscation emerged as an efficient solution to strengthen the security of integrated circuits (ICs) from multiple threats including reverse engineering and intellectual property (IP) theft. Emergence of Boolean Satisfiability (SAT) attacks and its variants have shown to circumvent the security mechanisms such as obfuscation and a plethora of its variants. Considering the size of ICs and the amount of time it takes to validate a defense i.e., obfuscation against SAT attack could range from few ms to days. In contrast, our current work focuses on devising an iterative, dynamic and intelligent SAT-hard clause generator for a given SAT-prone problem. The proposed Machine Learning (ML)-based SAT to unSAT clause translator is a SAT-hard clause generator that utilizes a bipartite propagation based neural network model. The utilized model comprises multiple layers of artificial neural networks to extract the dependencies of literals and variables, followed by long short term memory (LSTM) networks to validate the SAT hardness. The proposed ML-based SAT to unSAT clause translator is trained with conjunctive normal form (CNF) of the IC netlist that are both SAT solvable and SAT-hard. Further, the model is also trained to convert a CNF from satisfiable (SAT) to unsatisfiable (unSAT) form with minor perturbation (which translates to minor overheads) so that the SAT-attack cannot decrypt the keys. To the best of our knowledge, no previous work has been reported on neural network based SAT-hard clause or CNF translator for circuit obfuscation. We evaluate our proposed models's empirical performance against MiniSAT with 300 CNFs.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132996039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigating write disturbance in phase change memory architectures: work-in-progress 减轻相变存储器结构中的写入干扰:正在进行的工作
Chao H. Huang, Ishan G. Thakkar
Phase Change Memory (PCM) is seen as a potential candidate that can replace DRAM as main memory, due to its better scalability. However, writing `0s' in PCM cells requires high-temperature RESET operations, which induce write disturbance errors in neighboring idle PCM cells due to excessive heat dissipation. This paper introduces low-temperature partial-RESET operations for writing `0s' in PCM cells. Compared to traditional RESET operations, partial-RESET operations dissipate negligible heat, and therefore, do not cause disturbance errors in neighboring cells during PCM writes.
相变存储器(PCM)由于具有更好的可扩展性,被视为替代DRAM作主存储器的潜在候选。然而,在PCM单元中写入' 0 '需要高温RESET操作,这将导致邻近空闲PCM单元由于过度散热而产生写入干扰错误。本文介绍了在PCM单元中写入“0”的低温部分复位操作。与传统的RESET操作相比,部分RESET操作散发的热量可以忽略不计,因此,在PCM写入过程中不会对相邻单元造成干扰错误。
{"title":"Mitigating write disturbance in phase change memory architectures: work-in-progress","authors":"Chao H. Huang, Ishan G. Thakkar","doi":"10.1145/3349569.3351539","DOIUrl":"https://doi.org/10.1145/3349569.3351539","url":null,"abstract":"Phase Change Memory (PCM) is seen as a potential candidate that can replace DRAM as main memory, due to its better scalability. However, writing `0s' in PCM cells requires high-temperature RESET operations, which induce write disturbance errors in neighboring idle PCM cells due to excessive heat dissipation. This paper introduces low-temperature partial-RESET operations for writing `0s' in PCM cells. Compared to traditional RESET operations, partial-RESET operations dissipate negligible heat, and therefore, do not cause disturbance errors in neighboring cells during PCM writes.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126929809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sequence-crafter: side-channel entropy minimization to thwart timing-based side-channel attacks: work-in-progress 序列制作者:边信道熵最小化以阻止基于时间的边信道攻击:正在进行的工作
Abhijitt Dhavlle, S. Bhat, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao
The hardware security domain in recent years has experienced a plethora of side-channel attacks (SCAs) with cache-based SCAs being one of the dominant threats. These SCAs function by exploiting the side-channels which invariably leak important data during an application's execution. Shutting down the side channels is not a feasible approach due to various restrictions it would pose to system performance. To overcome such concerns and protect the data integrity, we introduce Sequence-Crafter (SC) in this work. The proposed Sequence-Crafter (SC) aims to minimize the entropy in the side channel leaked information rather than attempting to close the side-channels. To achieve this, we introduce carefully crafted perturbations into the victim application which will be randomly activated to introduce perturbations, thus resulting in misleading information which looks legit that will be observed by the attacker. This methodology has been successfully tested for Flush+Reload attack and the key information observed by the attacker is seen to be completely futile, indicating the success of proposed method.
近年来,硬件安全领域经历了大量的侧通道攻击(sca),其中基于缓存的sca是主要威胁之一。这些sca通过利用在应用程序执行期间总是泄漏重要数据的侧通道来发挥作用。关闭侧通道不是一种可行的方法,因为它会对系统性能造成各种限制。为了克服这些问题并保护数据的完整性,我们在这项工作中引入了Sequence-Crafter (SC)。所提出的序列生成(SC)旨在最小化侧信道泄漏信息中的熵,而不是试图关闭侧信道。为了实现这一目标,我们将精心设计的扰动引入受害者应用程序,该应用程序将随机激活以引入扰动,从而导致误导性信息,这些信息看起来是合法的,将被攻击者观察到。此方法已成功测试Flush+Reload攻击,攻击者观察到的关键信息完全无效,表明所提出的方法成功。
{"title":"Sequence-crafter: side-channel entropy minimization to thwart timing-based side-channel attacks: work-in-progress","authors":"Abhijitt Dhavlle, S. Bhat, S. Rafatirad, H. Homayoun, Sai Manoj Pudukotai Dinakarrao","doi":"10.1145/3349569.3351543","DOIUrl":"https://doi.org/10.1145/3349569.3351543","url":null,"abstract":"The hardware security domain in recent years has experienced a plethora of side-channel attacks (SCAs) with cache-based SCAs being one of the dominant threats. These SCAs function by exploiting the side-channels which invariably leak important data during an application's execution. Shutting down the side channels is not a feasible approach due to various restrictions it would pose to system performance. To overcome such concerns and protect the data integrity, we introduce Sequence-Crafter (SC) in this work. The proposed Sequence-Crafter (SC) aims to minimize the entropy in the side channel leaked information rather than attempting to close the side-channels. To achieve this, we introduce carefully crafted perturbations into the victim application which will be randomly activated to introduce perturbations, thus resulting in misleading information which looks legit that will be observed by the attacker. This methodology has been successfully tested for Flush+Reload attack and the key information observed by the attacker is seen to be completely futile, indicating the success of proposed method.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Porting new versatile video coding transforms to a heterogeneous GPU-based technology: work-in-progress 将新的通用视频编码转换为基于异构gpu的技术:工作正在进行中
M. F. Vázquez, Anup Saha, Rafael Medina Morillas, Miguel Chavarrías Lapastora, Fernando Pescador del Oso
The sustained increase in the video digital features and traffic requirements across the networks is demanding more efficiency from both, video coding standards and platforms. In this context, a first version of the future de facto standard, Versatile Video Coding (VVC), is partially migrated to a GPU-based architecture integrated into a heterogeneous platform. Results show an improvement of 11 times for the new Adaptive Multiple Transform (AMT) transforms.
随着网络上视频数字特性和流量需求的持续增长,对视频编码标准和平台的效率提出了更高的要求。在这种情况下,未来事实标准的第一个版本,通用视频编码(VVC),部分迁移到集成到异构平台的基于gpu的架构。结果表明,新的自适应多重变换(AMT)变换的性能提高了11倍。
{"title":"Porting new versatile video coding transforms to a heterogeneous GPU-based technology: work-in-progress","authors":"M. F. Vázquez, Anup Saha, Rafael Medina Morillas, Miguel Chavarrías Lapastora, Fernando Pescador del Oso","doi":"10.1145/3349569.3351540","DOIUrl":"https://doi.org/10.1145/3349569.3351540","url":null,"abstract":"The sustained increase in the video digital features and traffic requirements across the networks is demanding more efficiency from both, video coding standards and platforms. In this context, a first version of the future de facto standard, Versatile Video Coding (VVC), is partially migrated to a GPU-based architecture integrated into a heterogeneous platform. Results show an improvement of 11 times for the new Adaptive Multiple Transform (AMT) transforms.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122840259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MicroArchitectural events and image processing-based hybrid approach for robust malware detection: work-in-progress 基于微架构事件和图像处理的鲁棒恶意软件检测混合方法:正在研究中
Sanket Shukla, Gaurav Kolhe, S. D, S. Rafatirad
To thwart the detection of malware through traditional and emerging approaches, malware development has seen a paradigm of embedding the malware into benign applications. This calls for a localized feature extraction scheme for detecting stealthy malware with more robustness. To address this challenge, we introduce a hybrid approach which utilizes the microarchitectural traces obtained through on-chip embedded hardware performance counters (HPCs) and the application binary for malware detection. The obtained HPCs are fed to multi-stage machine learning (ML) classifier for detecting and classifying the malware. To overcome the challenge of detecting the stealthy malware, image processing based approach is applied in parallel. In this approach, the malware binaries are converted into images, which is further converted into sequences and fed to recurrent neural networks to recognize patterns of stealthy malware. Based on the localized patterns, sequence classification is further applied to perform binary classification and further discover the variation of the identified malware family. Our proposed framework exhibits high resilience to popular obfuscation techniques such as code relocation.
为了通过传统和新兴的方法阻止恶意软件的检测,恶意软件的开发已经看到了将恶意软件嵌入良性应用程序的范例。这就需要一种局部特征提取方案来检测更具鲁棒性的隐身恶意软件。为了应对这一挑战,我们引入了一种混合方法,该方法利用通过片上嵌入式硬件性能计数器(hpc)获得的微架构跟踪和应用程序二进制来检测恶意软件。得到的hpc被送入多阶段机器学习(ML)分类器进行恶意软件检测和分类。为了克服检测隐身恶意软件的挑战,采用了基于图像处理的并行方法。在这种方法中,恶意软件二进制文件被转换成图像,图像进一步转换成序列,并馈送到循环神经网络以识别隐形恶意软件的模式。在定位模式的基础上,进一步采用序列分类进行二值分类,进一步发现识别出的恶意软件家族的变异。我们提出的框架对流行的混淆技术(如代码重定位)具有很高的弹性。
{"title":"MicroArchitectural events and image processing-based hybrid approach for robust malware detection: work-in-progress","authors":"Sanket Shukla, Gaurav Kolhe, S. D, S. Rafatirad","doi":"10.1145/3349569.3351538","DOIUrl":"https://doi.org/10.1145/3349569.3351538","url":null,"abstract":"To thwart the detection of malware through traditional and emerging approaches, malware development has seen a paradigm of embedding the malware into benign applications. This calls for a localized feature extraction scheme for detecting stealthy malware with more robustness. To address this challenge, we introduce a hybrid approach which utilizes the microarchitectural traces obtained through on-chip embedded hardware performance counters (HPCs) and the application binary for malware detection. The obtained HPCs are fed to multi-stage machine learning (ML) classifier for detecting and classifying the malware. To overcome the challenge of detecting the stealthy malware, image processing based approach is applied in parallel. In this approach, the malware binaries are converted into images, which is further converted into sequences and fed to recurrent neural networks to recognize patterns of stealthy malware. Based on the localized patterns, sequence classification is further applied to perform binary classification and further discover the variation of the identified malware family. Our proposed framework exhibits high resilience to popular obfuscation techniques such as code relocation.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Flexible group-level pruning of deep neural networks for fast inference on mobile CPUs: work-in-progress 移动cpu上用于快速推理的深度神经网络的灵活组级修剪:正在研究中
Kwangbae Lee, Hoseung Kim, Hayun Lee, Dongkun Shin
Network pruning is a promising compression technique to reduce computation and memory access cost of deep neural networks. In this paper, we propose a novel group-level pruning method to accelerate deep neural networks on mobile GPUs, where several adjacent weights are pruned in a group while providing high accuracy. Although several group-level pruning techniques have been proposed, the previous techniques can not achieve the desired accuracy at high sparsity. In this paper, we propose a unaligned approach to improve the accuracy of compressed model.
网络修剪是一种很有前途的压缩技术,可以减少深度神经网络的计算量和内存访问成本。在本文中,我们提出了一种新的组级修剪方法来加速移动gpu上的深度神经网络,该方法在提供高精度的同时在一组中修剪多个相邻的权值。虽然已经提出了几种组级剪枝技术,但以往的技术在高稀疏度下无法达到预期的精度。在本文中,我们提出了一种不对齐的方法来提高压缩模型的精度。
{"title":"Flexible group-level pruning of deep neural networks for fast inference on mobile CPUs: work-in-progress","authors":"Kwangbae Lee, Hoseung Kim, Hayun Lee, Dongkun Shin","doi":"10.1145/3349569.3351537","DOIUrl":"https://doi.org/10.1145/3349569.3351537","url":null,"abstract":"Network pruning is a promising compression technique to reduce computation and memory access cost of deep neural networks. In this paper, we propose a novel group-level pruning method to accelerate deep neural networks on mobile GPUs, where several adjacent weights are pruned in a group while providing high accuracy. Although several group-level pruning techniques have been proposed, the previous techniques can not achieve the desired accuracy at high sparsity. In this paper, we propose a unaligned approach to improve the accuracy of compressed model.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ECC management with rate compatible LDPC code for NAND flash storage: work-in-progress 用于NAND闪存存储的具有速率兼容LDPC代码的ECC管理:正在进行中
Jae-Bin Lee, Geon-Myeong Kim, Seungho Lim
The NAND flash memory has rapidly increased in storage capacity per unit area, and the rate of occurrence of errors per P/E cycle is also rapidly increasing accordingly. ECC modules such as LDPC have been added to flash controller for recovering from the errors. However, the system designs to increase the lifetime of the flash memory storage device are still in great demand. In this paper, we design the LDPC encoding and decoding scheme to get stepwise code rate according to the P/E cycle by applying rate-compatible LDPC, as well as the management scheme of excessive parity data. Through this, we can improve the error recovery rate of flash memory storage system and extend the lifetime of NAND flash storage system while reducing the system read and write overhead due to the increase in additional parity data.
随着NAND闪存单位面积存储容量的迅速增加,每P/E周期的出错率也在迅速增加。flash控制器中增加了LDPC等ECC模块,用于错误恢复。然而,提高闪存存储设备寿命的系统设计仍有很大的需求。本文采用兼容码率的LDPC设计了LDPC编解码方案,根据P/E周期逐步得到码率,并设计了过多奇偶数据的管理方案。通过这种方法,可以提高闪存存储系统的错误恢复率,延长NAND闪存存储系统的使用寿命,同时减少由于额外奇偶校验数据的增加而造成的系统读写开销。
{"title":"ECC management with rate compatible LDPC code for NAND flash storage: work-in-progress","authors":"Jae-Bin Lee, Geon-Myeong Kim, Seungho Lim","doi":"10.1145/3349569.3351535","DOIUrl":"https://doi.org/10.1145/3349569.3351535","url":null,"abstract":"The NAND flash memory has rapidly increased in storage capacity per unit area, and the rate of occurrence of errors per P/E cycle is also rapidly increasing accordingly. ECC modules such as LDPC have been added to flash controller for recovering from the errors. However, the system designs to increase the lifetime of the flash memory storage device are still in great demand. In this paper, we design the LDPC encoding and decoding scheme to get stepwise code rate according to the P/E cycle by applying rate-compatible LDPC, as well as the management scheme of excessive parity data. Through this, we can improve the error recovery rate of flash memory storage system and extend the lifetime of NAND flash storage system while reducing the system read and write overhead due to the increase in additional parity data.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117267816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic generation of application-specific FPGA overlays: work-in-progress 自动生成特定应用的FPGA覆盖层:正在进行的工作
Danielle Tchuinkou Kwadjo, Joel Mandebi Mbongue, C. Bobda
This work proposes a generic flow for designing application-specific FPGA overlays that can achieve bare metal performance while improving productivity, resulting in increased adoption of FPGAs by software developers. The proposed approach relies on automatic extraction of kernels in high-level language applications. Extracted Kernels are then systematically translated into optimized hardware circuits using RapidWright, which allows bypassing HDL design flows. Initial results show up to 19x productivity improvement over regular overlays, and higher Fmax compared to bare metal in several cases.
这项工作提出了设计特定应用的FPGA覆盖层的通用流程,可以在提高生产力的同时实现裸机性能,从而增加软件开发人员对FPGA的采用。提出的方法依赖于高级语言应用程序中的核的自动提取。然后使用RapidWright系统地将提取的核转换为优化的硬件电路,从而可以绕过HDL设计流程。初步结果显示,与常规覆盖层相比,生产率提高了19倍,在某些情况下,与裸机相比,Fmax更高。
{"title":"Automatic generation of application-specific FPGA overlays: work-in-progress","authors":"Danielle Tchuinkou Kwadjo, Joel Mandebi Mbongue, C. Bobda","doi":"10.1145/3349569.3351533","DOIUrl":"https://doi.org/10.1145/3349569.3351533","url":null,"abstract":"This work proposes a generic flow for designing application-specific FPGA overlays that can achieve bare metal performance while improving productivity, resulting in increased adoption of FPGAs by software developers. The proposed approach relies on automatic extraction of kernels in high-level language applications. Extracted Kernels are then systematically translated into optimized hardware circuits using RapidWright, which allows bypassing HDL design flows. Initial results show up to 19x productivity improvement over regular overlays, and higher Fmax compared to bare metal in several cases.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained acceleration using runtime integrated custom execution (RICE): work-in-progress 使用运行时集成自定义执行(RICE)的细粒度加速:正在进行的工作
Leela Pakanati, John T. McMichen, Z. Estrada
Runtime Integrated Custom Execution (RICE) relocates traditional peripheral reconfigurable acceleration devices into the pipeline of the processor. This relocation unlocks fine-grained acceleration previously impeded by communication overhead to a peripheral accelerator. Preliminary simulation results on a subset of the PARSEC benchmark suite shows promise for RICE in HPC applications.
运行时集成自定义执行(RICE)将传统的外设可重构加速设备重新安置到处理器的流水线中。这种重定位解除了以前被外设加速器的通信开销所阻碍的细粒度加速。在PARSEC基准测试套件的一个子集上的初步模拟结果显示了RICE在HPC应用中的前景。
{"title":"Fine-grained acceleration using runtime integrated custom execution (RICE): work-in-progress","authors":"Leela Pakanati, John T. McMichen, Z. Estrada","doi":"10.1145/3349569.3351536","DOIUrl":"https://doi.org/10.1145/3349569.3351536","url":null,"abstract":"Runtime Integrated Custom Execution (RICE) relocates traditional peripheral reconfigurable acceleration devices into the pipeline of the processor. This relocation unlocks fine-grained acceleration previously impeded by communication overhead to a peripheral accelerator. Preliminary simulation results on a subset of the PARSEC benchmark suite shows promise for RICE in HPC applications.","PeriodicalId":306252,"journal":{"name":"Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion","volume":"1967 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114912630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1