首页 > 最新文献

2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
System-Level Vulnerability Estimation for Data Caches 数据缓存的系统级漏洞评估
Alireza Haghdoost, H. Asadi, A. Baniasadi
Over the past few years, radiation-induced transient errors, also referred to as soft errors, have been a severe threat to the data integrity of high-end and mainstream processors. Recent studies show that cache memories are among the most vulnerable components to soft errors within high-performance processors. Accurate modeling of the Vulnerability Factor (VF) is an essential step towards developing cost-effective protection techniques for cache memory. Although Fault Injection (FI) techniques can provide relatively accurate VF estimations they are often very time consuming. To overcome the limitation, recent analytical models were proposed to compute the cache VF in a timely fashion. In this paper, we extend previous work and propose an alternative analytical model to compute System-level Vulnerability Factor (SVF) for both write-through and write-back data caches. In our proposed analytical model, we take into account both read frequency and error masking to compute system-level vulnerability of data cache. Previously suggested modeling techniques overlook the issues of read frequency and error masking, mainly focusing on time periods in which an error could propagate in the system. In this work we show that overlooking these two parameters can significantly impact the system-level VFs for data caches. We report our estimations for SPEC’2K benchmarks and compare to previously suggested models. Our experimental results show that the proposed modeling technique changes previous VF estimations by up to 40%.
在过去的几年中,辐射引起的瞬态错误,也称为软错误,已经严重威胁到高端和主流处理器的数据完整性。最近的研究表明,高速缓存存储器是高性能处理器中最容易出现软错误的组件之一。对漏洞因子(VF)的精确建模是开发具有成本效益的高速缓存保护技术的必要步骤。尽管故障注入(FI)技术可以提供相对准确的VF估计,但它们通常非常耗时。为了克服这一限制,最近提出了分析模型来及时计算缓存VF。在本文中,我们扩展了以前的工作,并提出了一种替代的分析模型来计算系统级漏洞因子(SVF),用于write-through和write-back数据缓存。在我们提出的分析模型中,我们同时考虑了读取频率和错误掩蔽来计算数据缓存的系统级漏洞。以前建议的建模技术忽略了读取频率和错误屏蔽的问题,主要关注错误可能在系统中传播的时间段。在这项工作中,我们表明忽略这两个参数会显著影响数据缓存的系统级VFs。我们报告了我们对SPEC ' 2K基准的估计,并与先前建议的模型进行了比较。我们的实验结果表明,所提出的建模技术改变了以前的VF估计高达40%。
{"title":"System-Level Vulnerability Estimation for Data Caches","authors":"Alireza Haghdoost, H. Asadi, A. Baniasadi","doi":"10.1109/PRDC.2010.9","DOIUrl":"https://doi.org/10.1109/PRDC.2010.9","url":null,"abstract":"Over the past few years, radiation-induced transient errors, also referred to as soft errors, have been a severe threat to the data integrity of high-end and mainstream processors. Recent studies show that cache memories are among the most vulnerable components to soft errors within high-performance processors. Accurate modeling of the Vulnerability Factor (VF) is an essential step towards developing cost-effective protection techniques for cache memory. Although Fault Injection (FI) techniques can provide relatively accurate VF estimations they are often very time consuming. To overcome the limitation, recent analytical models were proposed to compute the cache VF in a timely fashion. In this paper, we extend previous work and propose an alternative analytical model to compute System-level Vulnerability Factor (SVF) for both write-through and write-back data caches. In our proposed analytical model, we take into account both read frequency and error masking to compute system-level vulnerability of data cache. Previously suggested modeling techniques overlook the issues of read frequency and error masking, mainly focusing on time periods in which an error could propagate in the system. In this work we show that overlooking these two parameters can significantly impact the system-level VFs for data caches. We report our estimations for SPEC’2K benchmarks and compare to previously suggested models. Our experimental results show that the proposed modeling technique changes previous VF estimations by up to 40%.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121875462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Customizing Virtual Machine with Fault Injector by Integrating with SpecC Device Model for a Software Testing Environment D-Cloud 集成spec设备模型定制带有故障注入器的虚拟机软件测试环境D-Cloud
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.37
T. Hanawa, Hitoshi Koizumi, Takayuki Banzai, M. Sato, Shin'ichi Miura, Tadatoshi Ishii, Hidehisa Takamizawa
D-Cloud is a software testing environment for dependable parallel and distributed systems using cloud computing technology. We use Eucalyptus as cloud management software to manage virtual machines designed based on QEMU, called FaultVM, which have a fault injection mechanism. D-Cloud enables the test procedures to be automated using a large amount of computing resources in the cloud by interpreting the system configuration and the test scenario written in XML in D-Cloud front end and enables tests including hardware faults by emulating hardware faults by FaultVM flexibly. In the present paper, we describe the customization facility of FaultVM used to add new device models. We use SpecC, which is a system description language, to describe the behavior of devices, and a simulator generated from the description by SpecC is linked and integrated into FaultVM. This also makes the definition and injection of faults flexible without the modification of the original QEMU source codes. This facility allows D-Cloud to be used to test distributed systems with customized devices.
D-Cloud是一个使用云计算技术的可靠的并行和分布式系统的软件测试环境。我们使用Eucalyptus作为云管理软件来管理基于QEMU设计的虚拟机,称为FaultVM,它具有故障注入机制。D-Cloud通过在D-Cloud前端对系统配置和XML编写的测试场景进行解析,利用云中大量的计算资源实现测试过程自动化;通过FaultVM灵活模拟硬件故障,实现包括硬件故障在内的测试。在本文中,我们描述了FaultVM用于添加新设备模型的自定义功能。我们使用系统描述语言SpecC来描述设备的行为,并将SpecC描述生成的模拟器链接并集成到FaultVM中。这也使得在不修改原始QEMU源代码的情况下,可以灵活地定义和注入故障。该设施允许D-Cloud使用定制设备测试分布式系统。
{"title":"Customizing Virtual Machine with Fault Injector by Integrating with SpecC Device Model for a Software Testing Environment D-Cloud","authors":"T. Hanawa, Hitoshi Koizumi, Takayuki Banzai, M. Sato, Shin'ichi Miura, Tadatoshi Ishii, Hidehisa Takamizawa","doi":"10.1109/PRDC.2010.37","DOIUrl":"https://doi.org/10.1109/PRDC.2010.37","url":null,"abstract":"D-Cloud is a software testing environment for dependable parallel and distributed systems using cloud computing technology. We use Eucalyptus as cloud management software to manage virtual machines designed based on QEMU, called FaultVM, which have a fault injection mechanism. D-Cloud enables the test procedures to be automated using a large amount of computing resources in the cloud by interpreting the system configuration and the test scenario written in XML in D-Cloud front end and enables tests including hardware faults by emulating hardware faults by FaultVM flexibly. In the present paper, we describe the customization facility of FaultVM used to add new device models. We use SpecC, which is a system description language, to describe the behavior of devices, and a simulator generated from the description by SpecC is linked and integrated into FaultVM. This also makes the definition and injection of faults flexible without the modification of the original QEMU source codes. This facility allows D-Cloud to be used to test distributed systems with customized devices.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128867855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Analysis of Dependencies between Failures in the UNINETT IP Backbone Network uninet IP骨干网故障相关性分析
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.12
Andrés J. Gonzalez, B. Helvik, Jon Kåre Hellan, P. Kuusela
Dependencies between failures in operational networks may have a huge impact on their reliability and availability. In this paper we analyze failure logs to identify simultaneous and potentially correlated failures in routers and links of an IP backbone network. We show that the actual behavior of failure processes does not support the independence assumption commonly used in theoretical studies. Scatter plots are presented to visualize the failure processes, and it is seen that geographical adjacency has a pronounced effect. The existence of high correlation coefficients and high autocorrelation in some failure processes was observed. A formal analysis confirms this. The consequences of these dependencies on the provisioning of guaranteed availability are briefly discussed.
运行网络中故障之间的依赖关系可能对其可靠性和可用性产生巨大影响。在本文中,我们分析故障日志,以识别同时和潜在相关的故障在路由器和IP骨干网的链路。结果表明,失效过程的实际行为并不支持理论研究中常用的独立性假设。散点图显示了故障过程,可以看出地理上的邻接有明显的影响。观察到在某些失效过程中存在高相关系数和高自相关。正式分析证实了这一点。简要讨论了这些依赖关系对保证可用性供应的影响。
{"title":"Analysis of Dependencies between Failures in the UNINETT IP Backbone Network","authors":"Andrés J. Gonzalez, B. Helvik, Jon Kåre Hellan, P. Kuusela","doi":"10.1109/PRDC.2010.12","DOIUrl":"https://doi.org/10.1109/PRDC.2010.12","url":null,"abstract":"Dependencies between failures in operational networks may have a huge impact on their reliability and availability. In this paper we analyze failure logs to identify simultaneous and potentially correlated failures in routers and links of an IP backbone network. We show that the actual behavior of failure processes does not support the independence assumption commonly used in theoretical studies. Scatter plots are presented to visualize the failure processes, and it is seen that geographical adjacency has a pronounced effect. The existence of high correlation coefficients and high autocorrelation in some failure processes was observed. A formal analysis confirms this. The consequences of these dependencies on the provisioning of guaranteed availability are briefly discussed.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121199745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Deadlock Detection Scheduling for Distributed Processes in the Presence of System Failures 系统故障时分布式进程的死锁检测调度
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.49
A. Izumi, T. Dohi, N. Kaio
The occurrence of deadlocks should be controlled effectively by their detection and resolution, but may sometimes lead to a serious system failure. This fact implies that deadlock detection scheduling should be designed from the view points of not only the performance trade-off between overall message usage and deadlock persistence time but also the prevention of the system failure. In this paper, we reformulate the Ling {it{et al.}}'s deadlock detection scheduling problem (2006) in the presence of system failures, and derive the optimal deadlock detection time minimizing the long-run average cost per unit time. By introducing the message complexities of the deadlock detection and resolution algorithms being used, we investigate the asymptotically optimal frequency of deadlock detection scheduling in terms of the number of distributed processes through the well-known Landau notation.
应该通过检测和解决死锁来有效地控制死锁的发生,但死锁有时可能导致严重的系统故障。这一事实意味着,在设计死锁检测调度时,不仅要考虑总体消息使用情况和死锁持续时间之间的性能权衡,还要考虑防止系统故障。本文对Ling {it{et al.}}在存在系统故障的情况下的死锁检测调度问题(2006)进行了重新定义,并推导出使单位时间内长期平均成本最小的最优死锁检测时间。通过介绍所使用的死锁检测和解决算法的消息复杂性,我们通过著名的朗道符号研究了死锁检测调度的渐近最优频率,该频率与分布式进程的数量有关。
{"title":"Deadlock Detection Scheduling for Distributed Processes in the Presence of System Failures","authors":"A. Izumi, T. Dohi, N. Kaio","doi":"10.1109/PRDC.2010.49","DOIUrl":"https://doi.org/10.1109/PRDC.2010.49","url":null,"abstract":"The occurrence of deadlocks should be controlled effectively by their detection and resolution, but may sometimes lead to a serious system failure. This fact implies that deadlock detection scheduling should be designed from the view points of not only the performance trade-off between overall message usage and deadlock persistence time but also the prevention of the system failure. In this paper, we reformulate the Ling {it{et al.}}'s deadlock detection scheduling problem (2006) in the presence of system failures, and derive the optimal deadlock detection time minimizing the long-run average cost per unit time. By introducing the message complexities of the deadlock detection and resolution algorithms being used, we investigate the asymptotically optimal frequency of deadlock detection scheduling in terms of the number of distributed processes through the well-known Landau notation.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimating Computer Virus Propagation Based on Markovian Arrival Processes 基于马尔可夫到达过程的计算机病毒传播估计
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.36
H. Okamura, T. Dohi
This paper refines statistical inference of computer virus propagation with maximum likelihood (ML) estimation. In particular, in order to utilize actual infection data that are opened in Web sites, we reformulate classical stochastic models by Markovian arrival processes (MAPs). The reformulated models lead to plausible parameter estimation based on the ML estimation. We propose efficient algorithms to compute the ML estimates of epidemic models using the EM (expectation-maximization) algorithm. Experiments illustrate the estimation of virus propagation with real infection data by our methods. Finally we refer to characterization of virus propagation from the view point of stochastic modeling.
本文利用最大似然估计改进了计算机病毒传播的统计推断。特别是,为了利用网站上公开的实际感染数据,我们通过马尔可夫到达过程(MAPs)重新制定了经典的随机模型。重新表述的模型导致基于ML估计的似是而非的参数估计。我们提出了使用EM(期望最大化)算法来计算流行病模型的ML估计的有效算法。实验结果表明,本文提出的方法可以用实际感染数据对病毒传播进行估计。最后,我们从随机建模的角度来描述病毒的传播。
{"title":"Estimating Computer Virus Propagation Based on Markovian Arrival Processes","authors":"H. Okamura, T. Dohi","doi":"10.1109/PRDC.2010.36","DOIUrl":"https://doi.org/10.1109/PRDC.2010.36","url":null,"abstract":"This paper refines statistical inference of computer virus propagation with maximum likelihood (ML) estimation. In particular, in order to utilize actual infection data that are opened in Web sites, we reformulate classical stochastic models by Markovian arrival processes (MAPs). The reformulated models lead to plausible parameter estimation based on the ML estimation. We propose efficient algorithms to compute the ML estimates of epidemic models using the EM (expectation-maximization) algorithm. Experiments illustrate the estimation of virus propagation with real infection data by our methods. Finally we refer to characterization of virus propagation from the view point of stochastic modeling.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time Systems 任意截止时间实时系统最小任务周期的敏感性分析
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.16
Fengxiang Zhang, A. Burns, Sanjoy Baruah
The most important character of real-time systems is that they have stringent timing deadlines that must be guaranteed. A hard real-time system is required to complete its operations before all its timing deadlines. For a given task set, it is useful in an engineering context to know what changes to period can be made to a task that will deliver a schedulable system. In this paper, we develop the sensitivity analysis of task period for EDF scheduled systems on a uniprocessor. We prove that a minimum task period can be determined by a single pass of the QPA algorithm, an improved scheme is presented by using different initial values of the period. The approaches developed for sensitivity analysis of task period are therefore as efficient as QPA, and are easily incorporated into a system design support tool.
实时系统最重要的特点是它们具有必须保证的严格的时间截止日期。硬实时系统需要在所有时间期限之前完成其操作。对于给定的任务集,在工程上下文中了解可以对任务进行哪些周期更改以交付可调度系统是很有用的。本文研究了单处理机上EDF调度系统任务周期的敏感性分析。我们证明了QPA算法可以通过一次遍历来确定最小任务周期,并提出了使用不同周期初始值的改进方案。因此,为任务期敏感性分析而开发的方法与QPA一样有效,并且很容易合并到系统设计支持工具中。
{"title":"Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time Systems","authors":"Fengxiang Zhang, A. Burns, Sanjoy Baruah","doi":"10.1109/PRDC.2010.16","DOIUrl":"https://doi.org/10.1109/PRDC.2010.16","url":null,"abstract":"The most important character of real-time systems is that they have stringent timing deadlines that must be guaranteed. A hard real-time system is required to complete its operations before all its timing deadlines. For a given task set, it is useful in an engineering context to know what changes to period can be made to a task that will deliver a schedulable system. In this paper, we develop the sensitivity analysis of task period for EDF scheduled systems on a uniprocessor. We prove that a minimum task period can be determined by a single pass of the QPA algorithm, an improved scheme is presented by using different initial values of the period. The approaches developed for sensitivity analysis of task period are therefore as efficient as QPA, and are easily incorporated into a system design support tool.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123647717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Speculative Byzantine Algorithm for P2P System P2P系统的投机拜占庭算法
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.17
Y. Matsumoto, Hiromi Kobayashi
This paper presents a speculative Byzantine algorithm base on Zyzzyva which has high performance for applying to peer to peer (P2P). We adopt a hybrid P2P system with monitor node to improve the performance of pure P2P system.
本文提出了一种基于Zyzzyva的推测拜占庭算法,该算法具有高性能,可应用于点对点(P2P)。为了提高纯P2P系统的性能,我们采用了一种带有监控节点的混合型P2P系统。
{"title":"A Speculative Byzantine Algorithm for P2P System","authors":"Y. Matsumoto, Hiromi Kobayashi","doi":"10.1109/PRDC.2010.17","DOIUrl":"https://doi.org/10.1109/PRDC.2010.17","url":null,"abstract":"This paper presents a speculative Byzantine algorithm base on Zyzzyva which has high performance for applying to peer to peer (P2P). We adopt a hybrid P2P system with monitor node to improve the performance of pure P2P system.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123628556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FiRot: An Efficient Crosstalk Mitigation Method for Network-on-Chips FiRot:一种有效的片上网络串扰缓解方法
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.29
A. Patooghy, Mansour Shafaei, S. Miremadi, Hajar Falahati, Somayyeh Taheri
This paper proposes an efficient cross talk mitigation method for Network-on-Chips (NoCs). The proposed method investigates flits in each packet to minimize the number of harmful transition patterns appearing on the communication channels of NoC. To do this, the content of every flit is rotated with respect to the previously flit sent through the channel. Rotation is done to find a rotated version of the flit which minimizes the number of harmful transition patterns. A tag field is added into the rotated flit to enable the receiving side to recover the original flit. Maximum number of rotations is bounded by a fixed value to minimize the timing and power overheads of the proposed method. Evaluation of the proposed method is done in both analytical and simulation manners. VHDL-based simulations are carried out for several channel widths and several tag widths. Simulation results confirm that the proposed method effectively overcomes the cross talk problem while its timing and power overheads are negligible. Results of analytical evaluation are also in agreement with the simulation results.
提出了一种有效的片上网络串扰抑制方法。该方法研究了每个数据包中的迁移,以减少NoC通信信道上出现的有害迁移模式的数量。为此,每个flit的内容相对于通过通道发送的前一个flit进行旋转。旋转是为了找到一个旋转的flit版本,使有害的过渡模式的数量最小化。将标记字段添加到旋转的flit中,以使接收方能够恢复原始flit。最大旋转次数由一个固定值限定,以最小化所提出方法的时间和功率开销。通过分析和仿真两种方式对所提出的方法进行了评价。对几种信道宽度和几种标签宽度进行了基于vhdl的仿真。仿真结果表明,该方法有效地克服了串扰问题,同时其时序开销和功耗开销可以忽略不计。分析评价结果与仿真结果吻合较好。
{"title":"FiRot: An Efficient Crosstalk Mitigation Method for Network-on-Chips","authors":"A. Patooghy, Mansour Shafaei, S. Miremadi, Hajar Falahati, Somayyeh Taheri","doi":"10.1109/PRDC.2010.29","DOIUrl":"https://doi.org/10.1109/PRDC.2010.29","url":null,"abstract":"This paper proposes an efficient cross talk mitigation method for Network-on-Chips (NoCs). The proposed method investigates flits in each packet to minimize the number of harmful transition patterns appearing on the communication channels of NoC. To do this, the content of every flit is rotated with respect to the previously flit sent through the channel. Rotation is done to find a rotated version of the flit which minimizes the number of harmful transition patterns. A tag field is added into the rotated flit to enable the receiving side to recover the original flit. Maximum number of rotations is bounded by a fixed value to minimize the timing and power overheads of the proposed method. Evaluation of the proposed method is done in both analytical and simulation manners. VHDL-based simulations are carried out for several channel widths and several tag widths. Simulation results confirm that the proposed method effectively overcomes the cross talk problem while its timing and power overheads are negligible. Results of analytical evaluation are also in agreement with the simulation results.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126558130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security 增强安全性的加密计算性能分析和硬件加速
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.21
Jed Kao-Tung Chang, Shaoshan Liu, J. Gaudiot, Chen Liu
Security is very important in modern life due to most information is now stored in digital format. A good security mechanism will keep information secrecy and integrity, hence, plays an important role in modern information exchange. However, cryptography algorithms are extremely expensive in terms of execution time. To make data not easily being cracked, many arithmetic and logical operations will be executed in the encryption/decryption process with many data movement. This means the cryptographic applications are both computation and memory intensive. Using a general-purpose processor for this scenario would not be very cost-effective. This study addresses this problem. Compared to the previous designs, we used a performance analyzer to identify “hotspot” functions across a set of benchmarks. The hotspot function consumes a substantial amount of the execution time of the specific algorithm. Then we translate these hotspot functions into hardware accelerators to improve the performance. Overall we achieve 34 – 83 folds of speedup.
安全在现代生活中非常重要,因为现在大多数信息都以数字格式存储。良好的安全机制可以保证信息的保密性和完整性,因此在现代信息交换中起着重要的作用。然而,加密算法在执行时间上是非常昂贵的。为了使数据不容易被破解,在加解密过程中会进行大量的算术和逻辑运算,并进行大量的数据移动。这意味着加密应用程序是计算和内存密集型的。在这种情况下使用通用处理器不是很划算。这项研究解决了这个问题。与之前的设计相比,我们使用性能分析器在一组基准测试中识别“热点”功能。热点功能会占用特定算法的大量执行时间。然后将这些热点函数转换为硬件加速器来提高性能。总的来说,我们实现了34 - 83倍的加速。
{"title":"The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security","authors":"Jed Kao-Tung Chang, Shaoshan Liu, J. Gaudiot, Chen Liu","doi":"10.1109/PRDC.2010.21","DOIUrl":"https://doi.org/10.1109/PRDC.2010.21","url":null,"abstract":"Security is very important in modern life due to most information is now stored in digital format. A good security mechanism will keep information secrecy and integrity, hence, plays an important role in modern information exchange. However, cryptography algorithms are extremely expensive in terms of execution time. To make data not easily being cracked, many arithmetic and logical operations will be executed in the encryption/decryption process with many data movement. This means the cryptographic applications are both computation and memory intensive. Using a general-purpose processor for this scenario would not be very cost-effective. This study addresses this problem. Compared to the previous designs, we used a performance analyzer to identify “hotspot” functions across a set of benchmarks. The hotspot function consumes a substantial amount of the execution time of the specific algorithm. Then we translate these hotspot functions into hardware accelerators to improve the performance. Overall we achieve 34 – 83 folds of speedup.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"74 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131618646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic Static Fault Tree Analysis from System Models 基于系统模型的自动静态故障树分析
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.35
Jianwen Xiang, Kazuo Yanoo
The manual development of system reliability models such as fault trees could be costly and error prone in practice. In this paper, we focus on the problems of some traditional dynamic fault trees and present our static solutions to represent dynamic relations such as functional and sequential dependencies. The implementation of a tool for the automatic synthesis of our static fault trees from SysML system models is introduced.
在实际应用中,手工开发系统可靠性模型(如故障树)不仅成本高,而且容易出错。针对传统的动态故障树存在的问题,提出了动态故障树的静态解,以表示功能依赖关系和顺序依赖关系等动态关系。介绍了一个从SysML系统模型自动合成静态故障树的工具的实现。
{"title":"Automatic Static Fault Tree Analysis from System Models","authors":"Jianwen Xiang, Kazuo Yanoo","doi":"10.1109/PRDC.2010.35","DOIUrl":"https://doi.org/10.1109/PRDC.2010.35","url":null,"abstract":"The manual development of system reliability models such as fault trees could be costly and error prone in practice. In this paper, we focus on the problems of some traditional dynamic fault trees and present our static solutions to represent dynamic relations such as functional and sequential dependencies. The implementation of a tool for the automatic synthesis of our static fault trees from SysML system models is introduced.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127906604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1