首页 > 最新文献

2016 International Great Lakes Symposium on VLSI (GLSVLSI)最新文献

英文 中文
Reducing soft-error vulnerability of caches using data compression 利用数据压缩减少缓存的软错误漏洞
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2902977
Sparsh Mittal, J. Vetter
With ongoing chip miniaturization and voltage scaling, particle strike-induced soft errors present increasingly severe threat to the reliability of on-chip caches. In this paper, we present a technique to reduce the vulnerability of caches to soft-errors. Our technique uses data compression to reduce the number of vulnerable data bits in the cache and performs selective duplication of more critical data-bits to provide extra protection to them. Microarchitectural simulations have shown that our technique is effective in reducing cache vulnerability and outperforms another technique. For single and dual-core system configuration, the average reduction in cache vulnerability is 5.59× and 8.44×, respectively. Also, the implementation and performance overheads of our technique are minimal and it is useful for a broad range of workloads.
随着芯片小型化和电压微缩的不断发展,颗粒冲击引起的软误差对片上高速缓存的可靠性构成了越来越严重的威胁。在本文中,我们提出了一种减少缓存对软错误的脆弱性的技术。我们的技术使用数据压缩来减少缓存中易受攻击的数据位的数量,并对更关键的数据位执行选择性复制,为它们提供额外的保护。微体系结构模拟表明,我们的技术在减少缓存漏洞方面是有效的,并且优于其他技术。对于单核和双核系统配置,缓存漏洞的平均降低率分别为5.59倍和8.44倍。此外,我们的技术的实现和性能开销很小,适用于各种工作负载。
{"title":"Reducing soft-error vulnerability of caches using data compression","authors":"Sparsh Mittal, J. Vetter","doi":"10.1145/2902961.2902977","DOIUrl":"https://doi.org/10.1145/2902961.2902977","url":null,"abstract":"With ongoing chip miniaturization and voltage scaling, particle strike-induced soft errors present increasingly severe threat to the reliability of on-chip caches. In this paper, we present a technique to reduce the vulnerability of caches to soft-errors. Our technique uses data compression to reduce the number of vulnerable data bits in the cache and performs selective duplication of more critical data-bits to provide extra protection to them. Microarchitectural simulations have shown that our technique is effective in reducing cache vulnerability and outperforms another technique. For single and dual-core system configuration, the average reduction in cache vulnerability is 5.59× and 8.44×, respectively. Also, the implementation and performance overheads of our technique are minimal and it is useful for a broad range of workloads.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A metastability immune timing error masking flip-flop for dynamic variation tolerance 一种亚稳态免疫时序误差掩蔽触发器,用于动态变化容忍
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2902976
Govinda Sannena, B. P. Das
In this paper, two timing error masking flip-flops have been proposed, which are immune to metastability. The proposed flipflops exploit the concept of either delayed data or pulse based approach to detect timing errors. The timing violations are masked by passing direct data instead of master latch output to slave latch. Simulation results show that the proposed flip-flops such as type-A and type-B reduce the error masking latency up to 23% and 42% respectively in typical process corners and increase the effective timing error monitoring window compared to state of the art metastable immune flip-flops [14]. The proposed flip-flops can be used in dynamic voltage and frequency scaling (DVFS) applications. A 16-bit adder is implemented to evaluate the functionality of the proposed flip-flops in DVFS frame work and the simulation results show that the adder using the proposed flipflop can reduce up to 48% power consumption or improve the performance up to 50% in typical process corners compared to conventional worst case design.
本文提出了两种不受亚稳态影响的时序误差掩蔽触发器。所提出的触发器利用延迟数据的概念或基于脉冲的方法来检测时序误差。通过直接传递数据而不是将主锁存器输出传递到从锁存器来掩盖时间冲突。仿真结果表明,与现有的亚稳态免疫触发器相比,所提出的a型和b型触发器在典型过程拐角处的错误掩蔽延迟分别降低了23%和42%,并增加了有效的时序错误监测窗口[14]。所提出的触发器可用于动态电压和频率缩放(DVFS)应用。实现了一个16位加法器来评估所提出的触发器在DVFS框架工作中的功能,仿真结果表明,与传统的最坏情况设计相比,使用所提出触发器的加法器在典型过程拐角可以降低高达48%的功耗或提高高达50%的性能。
{"title":"A metastability immune timing error masking flip-flop for dynamic variation tolerance","authors":"Govinda Sannena, B. P. Das","doi":"10.1145/2902961.2902976","DOIUrl":"https://doi.org/10.1145/2902961.2902976","url":null,"abstract":"In this paper, two timing error masking flip-flops have been proposed, which are immune to metastability. The proposed flipflops exploit the concept of either delayed data or pulse based approach to detect timing errors. The timing violations are masked by passing direct data instead of master latch output to slave latch. Simulation results show that the proposed flip-flops such as type-A and type-B reduce the error masking latency up to 23% and 42% respectively in typical process corners and increase the effective timing error monitoring window compared to state of the art metastable immune flip-flops [14]. The proposed flip-flops can be used in dynamic voltage and frequency scaling (DVFS) applications. A 16-bit adder is implemented to evaluate the functionality of the proposed flip-flops in DVFS frame work and the simulation results show that the adder using the proposed flipflop can reduce up to 48% power consumption or improve the performance up to 50% in typical process corners compared to conventional worst case design.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Defense systems and IoT: Security issues in an era of distributed command and control 国防系统和物联网:分布式指挥和控制时代的安全问题
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2903038
Doug Palmer, Saverio Fazzari, S. Wartenberg
Just as the Internet of Things (IoT) stands to revolutionize the way we sense, analyze, and apply data in civilian life, defense systems are also working to enhance future mission capabilities with IoT logic and devices. Recently, Gen. James Cartwright, former vice chairman of the Joint Chiefs of Staff, stated: "The ability to move from number of men per machine to the number of machines per man is the ultimate objective here in a command and control construct." In defense systems, IoT stands to dramatically affect cost, data, and response time advantages through distributed sensing, analysis, and action. This summarizes a key need of the defense community as it relates to IoT: the creation of an organizational construct that allows effective man-machine partnering and action that conforms to the command and culture of the US military (see Figure 1).
正如物联网(IoT)将彻底改变我们在民用生活中感知、分析和应用数据的方式一样,国防系统也在努力通过物联网逻辑和设备增强未来的任务能力。最近,参谋长联席会议前副主席詹姆斯·卡特赖特将军(James Cartwright)表示:“从每台机器的数量转变为每台机器的数量是指挥和控制结构的最终目标。”在国防系统中,物联网通过分布式传感、分析和行动,将极大地影响成本、数据和响应时间优势。这总结了国防界与物联网相关的一个关键需求:创建一个组织结构,允许有效的人机合作和行动,符合美军的指挥和文化(见图1)。
{"title":"Defense systems and IoT: Security issues in an era of distributed command and control","authors":"Doug Palmer, Saverio Fazzari, S. Wartenberg","doi":"10.1145/2902961.2903038","DOIUrl":"https://doi.org/10.1145/2902961.2903038","url":null,"abstract":"Just as the Internet of Things (IoT) stands to revolutionize the way we sense, analyze, and apply data in civilian life, defense systems are also working to enhance future mission capabilities with IoT logic and devices. Recently, Gen. James Cartwright, former vice chairman of the Joint Chiefs of Staff, stated: \"The ability to move from number of men per machine to the number of machines per man is the ultimate objective here in a command and control construct.\" In defense systems, IoT stands to dramatically affect cost, data, and response time advantages through distributed sensing, analysis, and action. This summarizes a key need of the defense community as it relates to IoT: the creation of an organizational construct that allows effective man-machine partnering and action that conforms to the command and culture of the US military (see Figure 1).","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129672797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Temperature-aware dynamic voltage scaling for near-threshold computing 近阈值计算的温度感知动态电压缩放
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2902997
S. Kiamehr, Mojtaba Ebrahimi, M. Tahoori
Power/energy reduction is of uttermost importance for applications with stringent power/energy budget such as ultra-low power and energy-harvested systems. Aggressive voltage scaling and in particular Near-Threshold Computing (NTC) is a promising approach to reduce the power and energy consumption. However, reducing the supply voltage leads to drastic performance variation induced by process and runtime variation. Temperature variation is one of the major sources of performance variation. In this paper, we study the impact of temperature variation on the circuit behavior at near threshold region and show that the ambient temperature has a huge impact on the metrics such as circuit delay, power and energy consumption. We also propose a low-cost, ambient temperature-aware voltage scaling technique to reduce the unnecessary energy overhead caused by temperature variation. Simulation results show that our proposed approach reduces the energy consumption by more than 3X.
对于超低功耗和能量收集系统等具有严格功率/能量预算的应用,降低功率/能量至关重要。积极的电压缩放,特别是近阈值计算(NTC)是一种很有前途的方法,以减少电力和能源消耗。然而,降低电源电压会导致由工艺和运行时间变化引起的剧烈性能变化。温度变化是性能变化的主要来源之一。在本文中,我们研究了温度变化对近阈值区域电路行为的影响,并表明环境温度对电路延迟、功率和能耗等指标有巨大影响。我们还提出了一种低成本,环境温度敏感的电压缩放技术,以减少由温度变化引起的不必要的能量开销。仿真结果表明,我们提出的方法降低了3倍以上的能耗。
{"title":"Temperature-aware dynamic voltage scaling for near-threshold computing","authors":"S. Kiamehr, Mojtaba Ebrahimi, M. Tahoori","doi":"10.1145/2902961.2902997","DOIUrl":"https://doi.org/10.1145/2902961.2902997","url":null,"abstract":"Power/energy reduction is of uttermost importance for applications with stringent power/energy budget such as ultra-low power and energy-harvested systems. Aggressive voltage scaling and in particular Near-Threshold Computing (NTC) is a promising approach to reduce the power and energy consumption. However, reducing the supply voltage leads to drastic performance variation induced by process and runtime variation. Temperature variation is one of the major sources of performance variation. In this paper, we study the impact of temperature variation on the circuit behavior at near threshold region and show that the ambient temperature has a huge impact on the metrics such as circuit delay, power and energy consumption. We also propose a low-cost, ambient temperature-aware voltage scaling technique to reduce the unnecessary energy overhead caused by temperature variation. Simulation results show that our proposed approach reduces the energy consumption by more than 3X.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117317972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Concurrent error detection for reliable SHA-3 design 并发错误检测可靠的SHA-3设计
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2902985
Pei Luo, Cheng Li, Yunsi Fei
Cryptographic systems are vulnerable to random errors and injected faults. Soft errors can inadvertently happen in critical cryptographic modules and attackers can inject faults into systems to retrieve the embedded secret. Different schemes have been developed to improve the security and reliability of cryptographic systems. As the new SHA-3 standard, Keccak algorithm will be widely used in various cryptographic applications, and its implementation should b protected against random errors and injected faults. In this paper, we devise different parity checking methods to protect the operations of Keccak. Results show that our scheme can be easily implemented and can effectively protect Keccak system against random errors and fault attacks.
密码系统容易受到随机错误和注入错误的影响。软错误可能在关键的加密模块中无意中发生,攻击者可以将错误注入系统以检索嵌入的秘密。为了提高密码系统的安全性和可靠性,已经开发了不同的方案。Keccak算法作为新的SHA-3标准,将广泛应用于各种密码学应用中,其实现应防止随机错误和注入错误。在本文中,我们设计了不同的奇偶校验方法来保护Keccak的操作。结果表明,该方案易于实现,能够有效地保护Keccak系统免受随机错误和故障攻击。
{"title":"Concurrent error detection for reliable SHA-3 design","authors":"Pei Luo, Cheng Li, Yunsi Fei","doi":"10.1145/2902961.2902985","DOIUrl":"https://doi.org/10.1145/2902961.2902985","url":null,"abstract":"Cryptographic systems are vulnerable to random errors and injected faults. Soft errors can inadvertently happen in critical cryptographic modules and attackers can inject faults into systems to retrieve the embedded secret. Different schemes have been developed to improve the security and reliability of cryptographic systems. As the new SHA-3 standard, Keccak algorithm will be widely used in various cryptographic applications, and its implementation should b protected against random errors and injected faults. In this paper, we devise different parity checking methods to protect the operations of Keccak. Results show that our scheme can be easily implemented and can effectively protect Keccak system against random errors and fault attacks.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114083950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secret sharing and multi-user authentication: From visual cryptography to RRAM circuits 秘密共享和多用户认证:从视觉密码到随机存储器电路
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2903039
Md Tanvir Arafin, G. Qu
In this era of Internet of Things (IoT), connectivity exists everywhere, among everything (including people) at all times. Therefore, security, trust, and privacy become crucial to the design and implementation of IoT devices [12]. However, it is challenging to build security into IoT devices because most of them are constrained by extremely limited resources such as the battery, memory, and computation power etc. Inspired by the concept of visual cryptography [4] that requires the least amount of computation and a recent work on pure hardware-based single-user authentication [6], we present a novel solution to the secret sharing and multi-user authentication problem. Our solution is built on the observation that non-volatile resistive memories display nice monotonic and additive properties during resistive state transitions. We demonstrate how to design a hardware dependent multi-user authentication protocol using resistive random access memory (RRAM)-based hardware and provide the necessary circuits for the application. Finally, we simulate the proposed circuit to understand the nature of the operation and practical problems that these designs encounter during operation.
在这个物联网(IoT)时代,连接无处不在,任何时候都存在于所有事物(包括人)之间。因此,安全、信任和隐私对于物联网设备的设计和实现至关重要[12]。然而,在物联网设备中构建安全性是具有挑战性的,因为它们中的大多数都受到极其有限的资源(如电池、内存和计算能力等)的限制。受需要最少计算量的视觉密码学概念[4]和最近基于纯硬件的单用户认证工作[6]的启发,我们提出了一种新的秘密共享和多用户认证问题的解决方案。我们的解决方案是建立在观察到非易失性电阻存储器在电阻状态转换过程中表现出良好的单调和加性特性的基础上的。我们演示了如何使用基于电阻性随机存取存储器(RRAM)的硬件设计一个依赖于硬件的多用户认证协议,并提供了应用程序所需的电路。最后,我们模拟了所提出的电路,以了解这些设计在运行过程中遇到的实际问题。
{"title":"Secret sharing and multi-user authentication: From visual cryptography to RRAM circuits","authors":"Md Tanvir Arafin, G. Qu","doi":"10.1145/2902961.2903039","DOIUrl":"https://doi.org/10.1145/2902961.2903039","url":null,"abstract":"In this era of Internet of Things (IoT), connectivity exists everywhere, among everything (including people) at all times. Therefore, security, trust, and privacy become crucial to the design and implementation of IoT devices [12]. However, it is challenging to build security into IoT devices because most of them are constrained by extremely limited resources such as the battery, memory, and computation power etc. Inspired by the concept of visual cryptography [4] that requires the least amount of computation and a recent work on pure hardware-based single-user authentication [6], we present a novel solution to the secret sharing and multi-user authentication problem. Our solution is built on the observation that non-volatile resistive memories display nice monotonic and additive properties during resistive state transitions. We demonstrate how to design a hardware dependent multi-user authentication protocol using resistive random access memory (RRAM)-based hardware and provide the necessary circuits for the application. Finally, we simulate the proposed circuit to understand the nature of the operation and practical problems that these designs encounter during operation.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"90 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122103315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real-time analysis for wormhole NoC: Revisited and revised 虫洞NoC的实时分析:重新审视和修订
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2903023
Qin Xiong, Zhonghai Lu, Fei Wu, C. Xie
The network delay upper-bound analysis problem is of fundamental importance to real-time applications in Network-on-Chip (NoC). In the paper, we revisit a state-of-the-art analysis model for real-time communication in wormhole NoC with priority-based preemptive arbitration and show that the model may provide pessimistic or even incorrect network delay upper-bound. We then propose a revised analysis model to correct the flaws in the previous model by further classifying indirect interference as upstream and downstream indirect interferences according to the relative positions of traffic flows and taking buffer influence into consideration. Simulated evaluations show that our model provides tighter and correct network delay upper-bound compared with the state-of-the-art model.
网络时延上界分析问题对片上网络的实时应用具有重要意义。在本文中,我们重新审视了基于优先级抢占仲裁的虫洞NoC实时通信的最新分析模型,并表明该模型可能提供悲观甚至错误的网络延迟上限。然后,我们提出一个修正的分析模型,根据交通流的相对位置将间接干扰进一步划分为上游和下游间接干扰,并考虑缓冲区的影响,以纠正先前模型的缺陷。仿真评估表明,与现有模型相比,我们的模型提供了更严格和正确的网络延迟上界。
{"title":"Real-time analysis for wormhole NoC: Revisited and revised","authors":"Qin Xiong, Zhonghai Lu, Fei Wu, C. Xie","doi":"10.1145/2902961.2903023","DOIUrl":"https://doi.org/10.1145/2902961.2903023","url":null,"abstract":"The network delay upper-bound analysis problem is of fundamental importance to real-time applications in Network-on-Chip (NoC). In the paper, we revisit a state-of-the-art analysis model for real-time communication in wormhole NoC with priority-based preemptive arbitration and show that the model may provide pessimistic or even incorrect network delay upper-bound. We then propose a revised analysis model to correct the flaws in the previous model by further classifying indirect interference as upstream and downstream indirect interferences according to the relative positions of traffic flows and taking buffer influence into consideration. Simulated evaluations show that our model provides tighter and correct network delay upper-bound compared with the state-of-the-art model.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Trellis-search based dynamic multi-path connection allocation for TDM-NoCs 基于网格搜索的tdm - noc动态多路径连接分配
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2902968
Yong Chen, E. Matús, G. Fettweis
This paper proposes a centralized approach for connection allocation for TDM-based NoCs by making use of dedicated hardware unit called NoCManager that employs trellis-based search algorithm enabling dynamic parallel multi-path, multislot allocation. Be different to the previous unrolled trellis search algorithm, in this paper the folded architecture is employed to achieve efficiency. In comparison with previous TDM connection allocation methods, the proposed design has the following advantages: (1) hardware supported low-latency, high-throughput allocation mechanism, (2) improved success rate due to parallel multi-path search and (3) efficient NoCManager architecture. Compared to centralized software solutions the proposed design demonstrates two orders of magnitude improvement in allocation speed and ten times higher success rate. It can provide up to several times higher allocation speed and up to 18% higher success rate against recently proposed distributed solution.
本文提出了一种集中的基于tdm的noc的连接分配方法,该方法利用名为nomanager的专用硬件单元,该单元采用基于网格的搜索算法,实现动态并行多路径、多时隙分配。与以往的展开网格搜索算法不同,本文采用折叠结构来提高搜索效率。与以往的TDM连接分配方法相比,本设计具有以下优点:(1)硬件支持低延迟、高吞吐量的分配机制;(2)并行多路径搜索提高了成功率;(3)高效的NoCManager架构。与集中式软件解决方案相比,提出的设计在分配速度上提高了两个数量级,成功率提高了十倍。与最近提出的分布式解决方案相比,它可以提供高达几倍的分配速度和高达18%的成功率。
{"title":"Trellis-search based dynamic multi-path connection allocation for TDM-NoCs","authors":"Yong Chen, E. Matús, G. Fettweis","doi":"10.1145/2902961.2902968","DOIUrl":"https://doi.org/10.1145/2902961.2902968","url":null,"abstract":"This paper proposes a centralized approach for connection allocation for TDM-based NoCs by making use of dedicated hardware unit called NoCManager that employs trellis-based search algorithm enabling dynamic parallel multi-path, multislot allocation. Be different to the previous unrolled trellis search algorithm, in this paper the folded architecture is employed to achieve efficiency. In comparison with previous TDM connection allocation methods, the proposed design has the following advantages: (1) hardware supported low-latency, high-throughput allocation mechanism, (2) improved success rate due to parallel multi-path search and (3) efficient NoCManager architecture. Compared to centralized software solutions the proposed design demonstrates two orders of magnitude improvement in allocation speed and ten times higher success rate. It can provide up to several times higher allocation speed and up to 18% higher success rate against recently proposed distributed solution.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126680615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Inter-tier crosstalk noise on power delivery networks for 3-D ICs with inductively-coupled interconnects 带电感耦合互连的三维集成电路供电网络的层间串扰噪声
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2903020
I. Papistas, V. Pavlidis
Inductive links have been proposed as an inter-tier interconnect solution for three-dimensional (3-D) integrated systems. Combined with signal multiplexing, inductive links achieve high communication bandwidth comparable to that of through silicon vias. However, being a wireless medium, electromagnetic coupling between the inductive link and nearby on-chip interconnects can cause voltage fluctuations affecting interconnect performance. Although the interference of interconnects on the operation of inductive links has been investigated, the inverse problem has yet to be explored. Consequently, this paper performs an investigation on the effect of electromagnetic coupling on different topologies of power delivery networks (PDNs) in the vicinity of on-chip inductors. Results indicate that the interdigitated PDN topology suffers from the induced noise due to the inductive links of the neighbouring tiers exhibiting a minimum aggregate noise of 131.3 mV. Alternatively, the paired topologies exhibit a superior noise behaviour, achieving a 39.4% and 35.4% decrease in noise level for paired type I and paired type II topologies, respectively, compared to the interdigitated topology.
电感链路被提出作为三维集成系统的层间互连解决方案。与信号复用相结合,电感链路可实现与硅通孔相当的高通信带宽。然而,作为一种无线介质,电感链路与附近片上互连之间的电磁耦合会引起电压波动,影响互连性能。虽然已经研究了互连对感应链路运行的干扰,但其逆问题尚未探索。因此,本文研究了电磁耦合对片上电感器附近不同拓扑的输电网络(pdn)的影响。结果表明,由于相邻层的感应链路,交叉数字PDN拓扑结构受到诱导噪声的影响,其最小总噪声为131.3 mV。另外,配对拓扑表现出优越的噪声行为,与交叉拓扑相比,配对I型和配对II型拓扑的噪声水平分别降低了39.4%和35.4%。
{"title":"Inter-tier crosstalk noise on power delivery networks for 3-D ICs with inductively-coupled interconnects","authors":"I. Papistas, V. Pavlidis","doi":"10.1145/2902961.2903020","DOIUrl":"https://doi.org/10.1145/2902961.2903020","url":null,"abstract":"Inductive links have been proposed as an inter-tier interconnect solution for three-dimensional (3-D) integrated systems. Combined with signal multiplexing, inductive links achieve high communication bandwidth comparable to that of through silicon vias. However, being a wireless medium, electromagnetic coupling between the inductive link and nearby on-chip interconnects can cause voltage fluctuations affecting interconnect performance. Although the interference of interconnects on the operation of inductive links has been investigated, the inverse problem has yet to be explored. Consequently, this paper performs an investigation on the effect of electromagnetic coupling on different topologies of power delivery networks (PDNs) in the vicinity of on-chip inductors. Results indicate that the interdigitated PDN topology suffers from the induced noise due to the inductive links of the neighbouring tiers exhibiting a minimum aggregate noise of 131.3 mV. Alternatively, the paired topologies exhibit a superior noise behaviour, achieving a 39.4% and 35.4% decrease in noise level for paired type I and paired type II topologies, respectively, compared to the interdigitated topology.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128179738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hardware-accelerated software library drivers generation for IP-centric SoC designs 以ip为中心的SoC设计的硬件加速软件库驱动程序生成
Pub Date : 2016-05-18 DOI: 10.1145/2902961.2903026
M. Jassi, Uzair Sharif, Daniel Mueller-Gritschneder, Ulf Schlichtmann
In recent years, the semiconductor industry has been witnessing an increasing reuse of hardware IPs for System-on-Chip (SoC) designs and embedded computing systems on FPGA platforms with hard-core processors. The IP-reuse comes with an increasing complexity at the hardware-software (HW-SW) interface. The efforts required to access the HW through the increasingly complex HW-SW interface diminishes the potential IP-reuse productivity gain. In our work, we are proposing hierarchical drivers for accessing IP-subsystems and its generation for enabling easier SW application adaptation to HW-changes and faster design space exploration (DSE) on a targeted HW-accelerated SW libraries. At the lowest level, closest to the HW, is the hardware abstraction layer (HAL), these are the platform-specific register-access drivers. At the next layer are the drivers to access the registers and bit-fields of each IP component of the IP-library. Next are the IP-subsystems drivers. At the top-layer, closest to the SW, is the simple scheduler with SW interface library that provides access functions to the SW application. The drivers generator uses the HW knowledge of IPs and IP-subsystems encoded in IP-XACT for generating the drivers for both operating system (OS) and non-OS based applications. For the OS-based applications, user-space drivers are generated, as well as device tree source (DTS) and drivers mapping in the kernel-space. In a case study, we have validated our methodology while performing DSE for a video processing application targeted to an IP-library, both as non-OS and with OS on Xilinx Zynq-based FPGA.
近年来,半导体行业见证了越来越多的硬件ip用于片上系统(SoC)设计和带有硬核处理器的FPGA平台上的嵌入式计算系统。ip复用伴随着硬件软件(HW-SW)接口的复杂性增加。通过日益复杂的HW- sw接口访问HW所需的工作量减少了潜在的ip重用生产力增益。在我们的工作中,我们提出了访问ip子系统的分层驱动程序及其生成,以使软件应用程序更容易适应hw变化,并在目标hw加速的软件库上更快地进行设计空间探索(DSE)。在最底层,最接近硬件的是硬件抽象层(HAL),这些是特定于平台的寄存器访问驱动程序。下一层是访问IP库中每个IP组件的寄存器和位域的驱动程序。接下来是ip子系统驱动程序。在顶层,最接近软件,是带有软件接口库的简单调度器,它为软件应用程序提供访问功能。驱动程序生成器使用IP-XACT中编码的ip和ip子系统的硬件知识,为基于操作系统和非操作系统的应用程序生成驱动程序。对于基于操作系统的应用程序,生成用户空间驱动程序,以及设备树源(DTS)和内核空间中的驱动程序映射。在一个案例研究中,我们验证了我们的方法,同时为针对ip库的视频处理应用程序执行DSE,包括非操作系统和基于Xilinx zynq的FPGA上的操作系统。
{"title":"Hardware-accelerated software library drivers generation for IP-centric SoC designs","authors":"M. Jassi, Uzair Sharif, Daniel Mueller-Gritschneder, Ulf Schlichtmann","doi":"10.1145/2902961.2903026","DOIUrl":"https://doi.org/10.1145/2902961.2903026","url":null,"abstract":"In recent years, the semiconductor industry has been witnessing an increasing reuse of hardware IPs for System-on-Chip (SoC) designs and embedded computing systems on FPGA platforms with hard-core processors. The IP-reuse comes with an increasing complexity at the hardware-software (HW-SW) interface. The efforts required to access the HW through the increasingly complex HW-SW interface diminishes the potential IP-reuse productivity gain. In our work, we are proposing hierarchical drivers for accessing IP-subsystems and its generation for enabling easier SW application adaptation to HW-changes and faster design space exploration (DSE) on a targeted HW-accelerated SW libraries. At the lowest level, closest to the HW, is the hardware abstraction layer (HAL), these are the platform-specific register-access drivers. At the next layer are the drivers to access the registers and bit-fields of each IP component of the IP-library. Next are the IP-subsystems drivers. At the top-layer, closest to the SW, is the simple scheduler with SW interface library that provides access functions to the SW application. The drivers generator uses the HW knowledge of IPs and IP-subsystems encoded in IP-XACT for generating the drivers for both operating system (OS) and non-OS based applications. For the OS-based applications, user-space drivers are generated, as well as device tree source (DTS) and drivers mapping in the kernel-space. In a case study, we have validated our methodology while performing DSE for a video processing application targeted to an IP-library, both as non-OS and with OS on Xilinx Zynq-based FPGA.","PeriodicalId":407054,"journal":{"name":"2016 International Great Lakes Symposium on VLSI (GLSVLSI)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 International Great Lakes Symposium on VLSI (GLSVLSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1