首页 > 最新文献

2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)最新文献

英文 中文
Run-time resource allocation for embedded Multiprocessor System-on-Chip using tree-based design space exploration 基于树型设计空间探索的嵌入式多处理器片上系统运行时资源分配
Sima Sinaei, A. Pimentel, O. Fatemi
The dynamic nature of application workloads in modern MPSoC-based embedded systems is growing. To cope with the dynamism of application workloads at run time and to improve the efficiency of the underlying system architecture, this paper presents a novel run-time resource allocation algorithm for multimedia applications with the objective of minimizing energy consumption for predefined deadlines. This algorithm is based on a novel tree-based design space exploration (DSE) method, which is performed in two phases: design-time and run-time. During design time, application clustering is combined with the tree-based DSE, and after that, feature extraction and application classification is performed during run-time based on well-known machine learning techniques. We evaluated our algorithm using a heterogeneous MPSoC system with several applications that have different communication and computation behaviors. Our experimental results revealed that during runtime, more than 91% of the applications were classified correctly by our proposed algorithm to select the best resources for allocation. Therefore the results clearly confirm that our algorithm is effective.
在现代基于mpsoc的嵌入式系统中,应用程序工作负载的动态特性正在增长。为了应对运行时应用程序工作负载的动态性,提高底层系统架构的效率,本文提出了一种新的多媒体应用程序运行时资源分配算法,其目标是在预定义的截止日期内最大限度地减少能耗。该算法基于一种新颖的基于树的设计空间探索方法,设计空间探索分为设计期和运行期两个阶段。在设计阶段,将应用聚类与基于树的DSE相结合,然后在运行阶段,基于知名的机器学习技术进行特征提取和应用分类。我们使用具有不同通信和计算行为的多个应用程序的异构MPSoC系统来评估我们的算法。实验结果表明,在运行时,我们提出的算法对91%以上的应用程序进行了正确的分类,以选择最佳的资源进行分配。因此,结果清楚地证实了我们的算法是有效的。
{"title":"Run-time resource allocation for embedded Multiprocessor System-on-Chip using tree-based design space exploration","authors":"Sima Sinaei, A. Pimentel, O. Fatemi","doi":"10.1109/DTIS.2017.7929873","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7929873","url":null,"abstract":"The dynamic nature of application workloads in modern MPSoC-based embedded systems is growing. To cope with the dynamism of application workloads at run time and to improve the efficiency of the underlying system architecture, this paper presents a novel run-time resource allocation algorithm for multimedia applications with the objective of minimizing energy consumption for predefined deadlines. This algorithm is based on a novel tree-based design space exploration (DSE) method, which is performed in two phases: design-time and run-time. During design time, application clustering is combined with the tree-based DSE, and after that, feature extraction and application classification is performed during run-time based on well-known machine learning techniques. We evaluated our algorithm using a heterogeneous MPSoC system with several applications that have different communication and computation behaviors. Our experimental results revealed that during runtime, more than 91% of the applications were classified correctly by our proposed algorithm to select the best resources for allocation. Therefore the results clearly confirm that our algorithm is effective.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Memristive devices: Technology, design automation and computing frontiers 记忆器件:技术、设计自动化和计算前沿
M. Barbareschi, A. Bosio, Hoang Anh Du Nguyen, S. Hamdioui, Marcello Traiola, E. Vatajelu
The memristor is an emerging technology which is triggering intense interdisciplinary activity. It has the potential of providing many benefits, such as energy efficiency, density, reconfigurability, nonvolatile memory, novel computational structures and approaches, massive parallelism, etc. These characteristics may lead to deeply revise existing computing and storage paradigms. This paper presents a comprehensive overview of memristor technology and its potential to design a new computational paradigm.
忆阻器是一项新兴技术,正在引发激烈的跨学科研究。它具有提供许多好处的潜力,如能源效率、密度、可重构性、非易失性存储器、新颖的计算结构和方法、大规模并行性等。这些特征可能会导致对现有计算和存储范式的深刻修改。本文全面概述了忆阻器技术及其设计新计算范式的潜力。
{"title":"Memristive devices: Technology, design automation and computing frontiers","authors":"M. Barbareschi, A. Bosio, Hoang Anh Du Nguyen, S. Hamdioui, Marcello Traiola, E. Vatajelu","doi":"10.1109/DTIS.2017.7930178","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7930178","url":null,"abstract":"The memristor is an emerging technology which is triggering intense interdisciplinary activity. It has the potential of providing many benefits, such as energy efficiency, density, reconfigurability, nonvolatile memory, novel computational structures and approaches, massive parallelism, etc. These characteristics may lead to deeply revise existing computing and storage paradigms. This paper presents a comprehensive overview of memristor technology and its potential to design a new computational paradigm.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128776435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Securing C/C++ applications with a SEcube™-based model-driven approach 使用基于SEcube™的模型驱动方法保护C/ c++应用程序
F. Gossen, Johannes Neubauer, B. Steffen
In this paper we demonstrate the power and flexibility of extreme model-driven design using C-IME, our integrated modelling environment for C/C++ by showing how easily an application modelled in C-IME can be enhanced with hardware security features. In fact, our approach does not require any changes of the application model. Rather, C-IME provides a dedicated modelling language for code generators which embodies a palette of security primitives that are implemented based on the SEcube™ API. We will illustrate how the required code generator can be modelled for a to-do list management application in our case study. It should be noted that this code generator is not limited to the considered application but it can be used to secure the file handling of any application modelled in C-IME.
在本文中,我们展示了使用C- ime(我们的C/ c++集成建模环境)的极端模型驱动设计的功能和灵活性,通过展示在C- ime中建模的应用程序可以如何轻松地使用硬件安全功能进行增强。实际上,我们的方法不需要对应用程序模型进行任何更改。相反,C-IME为代码生成器提供了一种专用的建模语言,它包含了一组基于SEcube™API实现的安全原语。在我们的案例研究中,我们将说明如何为待办事项列表管理应用程序建模所需的代码生成器。应该注意的是,这个代码生成器并不局限于所考虑的应用程序,但它可以用于保护在C-IME中建模的任何应用程序的文件处理。
{"title":"Securing C/C++ applications with a SEcube™-based model-driven approach","authors":"F. Gossen, Johannes Neubauer, B. Steffen","doi":"10.1109/DTIS.2017.7930157","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7930157","url":null,"abstract":"In this paper we demonstrate the power and flexibility of extreme model-driven design using C-IME, our integrated modelling environment for C/C++ by showing how easily an application modelled in C-IME can be enhanced with hardware security features. In fact, our approach does not require any changes of the application model. Rather, C-IME provides a dedicated modelling language for code generators which embodies a palette of security primitives that are implemented based on the SEcube™ API. We will illustrate how the required code generator can be modelled for a to-do list management application in our case study. It should be noted that this code generator is not limited to the considered application but it can be used to secure the file handling of any application modelled in C-IME.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of two different charge injector candidates for an on-chip Floating Gate recharging system 片上浮栅充电系统中两种不同的候选电荷注入器分析
J. Cesari, Á. Pineda, S. Danzeca, A. Masi, M. Brugger, Maria Del Mar Fernandez, E. Isern, M. Roca, E. García-Moreno
Two different structures as charge injectors for Floating Gate sensors are tested and analysed. First of all the theoretical charge injection processes are exposed and discussed. Secondly experimental results on both structures are presented. The experimental results allow to choose one of the structures as a candidate to be used embedded with the Floating Gate sensor system.
对两种不同结构的浮栅传感器电荷注入器进行了测试和分析。首先对理论电荷注入过程进行了揭示和讨论。其次给出了两种结构的实验结果。实验结果允许选择其中一种结构作为嵌入浮门传感器系统的候选结构。
{"title":"Analysis of two different charge injector candidates for an on-chip Floating Gate recharging system","authors":"J. Cesari, Á. Pineda, S. Danzeca, A. Masi, M. Brugger, Maria Del Mar Fernandez, E. Isern, M. Roca, E. García-Moreno","doi":"10.1109/DTIS.2017.7930181","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7930181","url":null,"abstract":"Two different structures as charge injectors for Floating Gate sensors are tested and analysed. First of all the theoretical charge injection processes are exposed and discussed. Secondly experimental results on both structures are presented. The experimental results allow to choose one of the structures as a candidate to be used embedded with the Floating Gate sensor system.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116251748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On hammock networks - sixty years after 在吊床网络上——六十年后
S. Cowell, L. Dăuş, Valeriu Beiu, P. Poulin
This paper considers the hammock networks introduced by Moore and Shannon in 1956. We mention reliability polynomials (including some of their properties) and go briefly over the state-of-the-art: theoretical, algorithmic and design oriented. These are advocating for using (small) hammock networks as a perfect fit for array-based designs of nano-devices (like, e.g., FinFETs, SegFETs, VFETs, VeSFETs, and various nanotubes transistors). Because array-based designs are expected to thrive, we have decided to take a very close look at small hammock networks. That is why we have calculated exactly the reliability polynomials of small hammock networks. As far as we know, the non-trivial reliability polynomials are reported here for the first time ever. The coefficients of the reliability polynomials have been determined using our own program, and knowing all of them exactly is intended for practicality (as hammock networks might play a central role in array-based designs). The paper ends with conclusions and future directions of research.
本文考虑1956年Moore和Shannon引入的吊床网络。我们提到了可靠性多项式(包括它们的一些属性),并简要介绍了最新的技术:理论、算法和面向设计。他们提倡使用(小型)吊床网络作为纳米器件阵列设计的完美选择(例如,finfet, segfet, vfet, vesfet和各种纳米管晶体管)。因为基于阵列的设计有望蓬勃发展,我们决定仔细研究一下小型吊床网络。这就是为什么我们精确地计算了小型吊床网络的可靠度多项式。据我们所知,本文首次报道了非平凡可靠度多项式。可靠性多项式的系数是用我们自己的程序确定的,确切地知道它们是为了实用(因为吊床网络可能在基于阵列的设计中发挥核心作用)。最后,本文给出了结论和未来的研究方向。
{"title":"On hammock networks - sixty years after","authors":"S. Cowell, L. Dăuş, Valeriu Beiu, P. Poulin","doi":"10.1109/DTIS.2017.7929871","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7929871","url":null,"abstract":"This paper considers the hammock networks introduced by Moore and Shannon in 1956. We mention reliability polynomials (including some of their properties) and go briefly over the state-of-the-art: theoretical, algorithmic and design oriented. These are advocating for using (small) hammock networks as a perfect fit for array-based designs of nano-devices (like, e.g., FinFETs, SegFETs, VFETs, VeSFETs, and various nanotubes transistors). Because array-based designs are expected to thrive, we have decided to take a very close look at small hammock networks. That is why we have calculated exactly the reliability polynomials of small hammock networks. As far as we know, the non-trivial reliability polynomials are reported here for the first time ever. The coefficients of the reliability polynomials have been determined using our own program, and knowing all of them exactly is intended for practicality (as hammock networks might play a central role in array-based designs). The paper ends with conclusions and future directions of research.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132858476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Holistic security via complex HW/SW platforms 通过复杂的硬件/软件平台实现整体安全
Giuseppe Airò Farulla, P. Prinetto, A. Varriale
This paper presents a methodology to implement holistic security systems on complex hardware and software platforms by means of a set of software APIs and conceptual abstraction layers which simplify both the security development and the security integration in existing infrastructures. To validate the methodology, all the hardware and software developments have been deployed on the SEcube™, an open security platform leveraging on a 3D SiP (System in Package) designed and produced by Blu5 Group, which integrates three key security elements in a single package: a fast floating-point Cortex-M4 CPU, a high-performance FPGA, and an EAL5+ certified Smart Card.
本文提出了一种在复杂的硬件和软件平台上实现整体安全系统的方法,通过一组软件api和概念抽象层来简化安全开发和现有基础设施中的安全集成。为了验证该方法,所有的硬件和软件开发都部署在SEcube™上,这是一个开放的安全平台,利用Blu5集团设计和生产的3D SiP(系统包),将三个关键的安全元素集成在一个包中:快速浮点Cortex-M4 CPU,高性能FPGA和EAL5+认证智能卡。
{"title":"Holistic security via complex HW/SW platforms","authors":"Giuseppe Airò Farulla, P. Prinetto, A. Varriale","doi":"10.1109/DTIS.2017.7930156","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7930156","url":null,"abstract":"This paper presents a methodology to implement holistic security systems on complex hardware and software platforms by means of a set of software APIs and conceptual abstraction layers which simplify both the security development and the security integration in existing infrastructures. To validate the methodology, all the hardware and software developments have been deployed on the SEcube™, an open security platform leveraging on a 3D SiP (System in Package) designed and produced by Blu5 Group, which integrates three key security elements in a single package: a fast floating-point Cortex-M4 CPU, a high-performance FPGA, and an EAL5+ certified Smart Card.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124149426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing ambient assisted living solutions: A research perspective 分析环境辅助生活解决方案:一个研究视角
Ashalatha Kunnappilly, Axel Legay, T. Margaria, C. Seceleanu, B. Steffen, Louis-Marie Traonouez
Typical AAL solutions rely on integrating capabilities for health monitoring, fall detection, communication and social inclusion, supervised physical exercises, vocal interfaces, robotic platforms etc. Ensuring the safe function and quality of service with respect to various extra-functional requirements like timing and security of such AAL solutions is of highest importance. To facilitate analysis, latest system development platforms provide underlying infrastructures for model-driven design (e.g., via the DIME tool), timing and resource-usage specification (e.g., via the REMES tool), security features (e.g., by employing SECube), and statistical model-checking techniques (e.g, via Plasma). In this paper, we discuss the challenges associated with analyzing complex AAL solutions, from relevant properties to semantic interoperability issues raised by employing various frameworks for modeling and analysis, and applicability to evolving architectures. We take as examples two of the prominent existing AAL architectures and our own prior experience.
典型的AAL解决方案依赖于集成健康监测、跌倒检测、通信和社会包容、监督的体育锻炼、语音接口、机器人平台等功能。对于AAL解决方案的各种额外功能需求(如时间和安全性),确保安全的功能和服务质量是最重要的。为了便于分析,最新的系统开发平台为模型驱动的设计(例如,通过DIME工具)、时间和资源使用规范(例如,通过REMES工具)、安全特性(例如,通过使用SECube)和统计模型检查技术(例如,通过Plasma)提供了底层的基础结构。在本文中,我们讨论了与分析复杂AAL解决方案相关的挑战,从相关属性到使用各种框架进行建模和分析所引起的语义互操作性问题,以及对不断发展的体系结构的适用性。我们以现有的两个突出的AAL体系结构和我们自己之前的经验为例。
{"title":"Analyzing ambient assisted living solutions: A research perspective","authors":"Ashalatha Kunnappilly, Axel Legay, T. Margaria, C. Seceleanu, B. Steffen, Louis-Marie Traonouez","doi":"10.1109/dtis.2017.7930168","DOIUrl":"https://doi.org/10.1109/dtis.2017.7930168","url":null,"abstract":"Typical AAL solutions rely on integrating capabilities for health monitoring, fall detection, communication and social inclusion, supervised physical exercises, vocal interfaces, robotic platforms etc. Ensuring the safe function and quality of service with respect to various extra-functional requirements like timing and security of such AAL solutions is of highest importance. To facilitate analysis, latest system development platforms provide underlying infrastructures for model-driven design (e.g., via the DIME tool), timing and resource-usage specification (e.g., via the REMES tool), security features (e.g., by employing SECube), and statistical model-checking techniques (e.g, via Plasma). In this paper, we discuss the challenges associated with analyzing complex AAL solutions, from relevant properties to semantic interoperability issues raised by employing various frameworks for modeling and analysis, and applicability to evolving architectures. We take as examples two of the prominent existing AAL architectures and our own prior experience.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114373622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A global approach for the improvement of UHF RFID safety and security 一种提高超高频射频识别安全性的全球方法
R. B. Fraj, V. Beroulle, N. Fourty, A. Meddeb
Radio Frequency Identification (RFID) devices are widely used in many domains such as tracking, marking and management of goods, smart houses (IoT), supply chains, etc. However, there is a big number of challenges which must still be overcome to ensure RFID security and privacy. In addition, due to the low cost and low consumption power of UHF RFID tags, communications between tags and readers are not robust. In this paper, we present our approach to evaluate at the same time the security and the safety of UHF RFID systems in order to improve them. First, this approach allows validating UHF RFID systems by simulation of the system behavior in presence of faults in a real environment. Secondly, evaluating the system robustness and the security of the used protocols, this approach will enable us to propose the development of new more reliable and secure protocols. Finally, it leads us to develop and validate new low cost and secure tag hardware architectures.
射频识别(RFID)设备广泛应用于商品跟踪、标记和管理、智能家居(IoT)、供应链等领域。然而,要确保RFID的安全性和保密性,还需要克服大量的挑战。此外,由于超高频RFID标签的低成本和低功耗,标签和读写器之间的通信并不健壮。在本文中,我们提出了一种同时评估超高频射频识别系统的安全性和安全性的方法,以改进它们。首先,这种方法允许通过模拟真实环境中存在故障的系统行为来验证UHF RFID系统。其次,评估系统鲁棒性和所使用协议的安全性,这种方法将使我们能够提出开发新的更可靠和更安全的协议。最后,它引导我们开发和验证新的低成本和安全的标签硬件架构。
{"title":"A global approach for the improvement of UHF RFID safety and security","authors":"R. B. Fraj, V. Beroulle, N. Fourty, A. Meddeb","doi":"10.1109/DTIS.2017.7930166","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7930166","url":null,"abstract":"Radio Frequency Identification (RFID) devices are widely used in many domains such as tracking, marking and management of goods, smart houses (IoT), supply chains, etc. However, there is a big number of challenges which must still be overcome to ensure RFID security and privacy. In addition, due to the low cost and low consumption power of UHF RFID tags, communications between tags and readers are not robust. In this paper, we present our approach to evaluate at the same time the security and the safety of UHF RFID systems in order to improve them. First, this approach allows validating UHF RFID systems by simulation of the system behavior in presence of faults in a real environment. Secondly, evaluating the system robustness and the security of the used protocols, this approach will enable us to propose the development of new more reliable and secure protocols. Finally, it leads us to develop and validate new low cost and secure tag hardware architectures.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Interconnect networks for resistive computing architectures 用于电阻计算架构的互连网络
Hoang Anh Du Nguyen, Lei Xie, Jintao Yu, M. Taouil, S. Hamdioui
Today's computing systems suffer from a memory/communication bottleneck, resulting in high energy consumption and saturated performance. This makes them inefficient in solving data-intensive applications at reasonable cost. Computation-In-Memory (CIM) architecture, based on the integration of storage and computation in the same physical location using non-volatile memristor crossbar technology, offers a potential solution to the memory bottleneck. An efficient interconnect network is essential to maximize CIM's architectural performance. This paper presents three interconnect network schemes for CIM architecture; these are (1) CMOS-based, (2) memristor-based and (3) hybrid cmos/memristor interconnect network scheme. To illustrate the feasibility of such schemes, a CIM parallel adder is used as a case study. The results show that the hybrid interconnect network scheme achieves a higher performance in comparison with the CMOS-based and memristor-based interconnect scheme in terms of delay, energy and area.
当今的计算系统受到内存/通信瓶颈的困扰,导致高能耗和饱和性能。这使得它们在以合理的成本解决数据密集型应用程序时效率低下。内存计算(CIM)体系结构基于使用非易失性忆阻交叉棒技术在同一物理位置集成存储和计算,为内存瓶颈提供了一种潜在的解决方案。高效的互连网络对于最大化CIM的架构性能至关重要。提出了三种用于CIM体系结构的互连网络方案;这些是(1)基于cmos,(2)基于忆阻器和(3)混合cmos/忆阻器互连网络方案。为了说明这些方案的可行性,本文以CIM并行加法器为例进行了研究。结果表明,与基于cmos和忆阻器的互连方案相比,混合互连网络方案在延迟、能量和面积方面具有更高的性能。
{"title":"Interconnect networks for resistive computing architectures","authors":"Hoang Anh Du Nguyen, Lei Xie, Jintao Yu, M. Taouil, S. Hamdioui","doi":"10.1109/DTIS.2017.7929872","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7929872","url":null,"abstract":"Today's computing systems suffer from a memory/communication bottleneck, resulting in high energy consumption and saturated performance. This makes them inefficient in solving data-intensive applications at reasonable cost. Computation-In-Memory (CIM) architecture, based on the integration of storage and computation in the same physical location using non-volatile memristor crossbar technology, offers a potential solution to the memory bottleneck. An efficient interconnect network is essential to maximize CIM's architectural performance. This paper presents three interconnect network schemes for CIM architecture; these are (1) CMOS-based, (2) memristor-based and (3) hybrid cmos/memristor interconnect network scheme. To illustrate the feasibility of such schemes, a CIM parallel adder is used as a case study. The results show that the hybrid interconnect network scheme achieves a higher performance in comparison with the CMOS-based and memristor-based interconnect scheme in terms of delay, energy and area.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128930810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An effective fault-injection framework for memory reliability enhancement perspectives 一种有效的故障注入框架,用于内存可靠性增强
G. Harcha, A. Bosio, P. Girard, A. Virazel, P. Bernardi
Embedded SRAM elements are becoming the main detractor of the overall System-on-Chip (SoC) yield. To increase the reliability of embedded SRAMs, the use of Error Correction Code (ECC) has been widely adopted. Depending on the implemented ECC scheme, SRAMs can detect/correct the presence of one or more transient errors during the mission time. In this paper, we investigate the possibility of exploiting the ECC for dealing with permanent faults due to physical defects in embedded SRAM. In this work, we present an effective fault-injection framework to inject static and dynamic faults and to determine their impact on a given ECC scheme. As case study, the target memory is a word-oriented SRAM including detection and correction codes. The proposed framework makes possible the evaluation of the SRAM behavior in the presence of different faulty scenarios. Injected faults involve single as well as multiple cells with static and dynamic behaviors.
嵌入式SRAM元件正在成为整体片上系统(SoC)成品率的主要破坏者。为了提高嵌入式ram的可靠性,错误纠正码(Error Correction Code, ECC)被广泛采用。根据实现的ECC方案,sram可以在任务期间检测/纠正一个或多个瞬态错误的存在。在本文中,我们研究了利用ECC来处理嵌入式SRAM中由于物理缺陷引起的永久故障的可能性。在这项工作中,我们提出了一个有效的故障注入框架来注入静态和动态故障,并确定它们对给定ECC方案的影响。作为案例研究,目标存储器是一个面向字的SRAM,包括检测码和纠错码。所提出的框架使得在不同故障情况下评估SRAM的行为成为可能。注入断层包括单个和多个具有静态和动态行为的单元。
{"title":"An effective fault-injection framework for memory reliability enhancement perspectives","authors":"G. Harcha, A. Bosio, P. Girard, A. Virazel, P. Bernardi","doi":"10.1109/DTIS.2017.7930172","DOIUrl":"https://doi.org/10.1109/DTIS.2017.7930172","url":null,"abstract":"Embedded SRAM elements are becoming the main detractor of the overall System-on-Chip (SoC) yield. To increase the reliability of embedded SRAMs, the use of Error Correction Code (ECC) has been widely adopted. Depending on the implemented ECC scheme, SRAMs can detect/correct the presence of one or more transient errors during the mission time. In this paper, we investigate the possibility of exploiting the ECC for dealing with permanent faults due to physical defects in embedded SRAM. In this work, we present an effective fault-injection framework to inject static and dynamic faults and to determine their impact on a given ECC scheme. As case study, the target memory is a word-oriented SRAM including detection and correction codes. The proposed framework makes possible the evaluation of the SRAM behavior in the presence of different faulty scenarios. Injected faults involve single as well as multiple cells with static and dynamic behaviors.","PeriodicalId":328905,"journal":{"name":"2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132422498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2017 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1