首页 > 最新文献

2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)最新文献

英文 中文
Convergence of design and fabrication technologies, a key enabler for HW-SW integration 设计和制造技术的融合,是推动“一带一路”一体化的关键因素
A. Jerraya
The last decade was dominated by HW-SW convergence where designers learned to combine hardware and software design to cope with the increased demand of lower cost and increased performances. This starting decade will be dominated by the convergence between design technology (HW and SW) and fabrication technologies. In fact more and more designs require a deep knowledge of technology characteristics to reach the required performances. On the other side, design technologies are more and more used to overcome fabrication process imperfection and to improve yield. This talk will first explain the achievements in HW-SW convergence and SoC design. Then, it will address the fabrication technology trends and challenges to deal with this convergence.
过去十年以HW-SW融合为主导,设计师学会了将硬件和软件设计结合起来,以应对不断增长的低成本和高性能需求。未来十年将以设计技术(硬件和软件)与制造技术的融合为主导。事实上,越来越多的设计需要深入了解技术特性才能达到所需的性能。另一方面,设计技术越来越多地用于克服制造工艺缺陷和提高良率。本讲座将首先介绍HW-SW融合和SoC设计方面的成就。然后,它将解决制造技术的趋势和挑战,以应对这种融合。
{"title":"Convergence of design and fabrication technologies, a key enabler for HW-SW integration","authors":"A. Jerraya","doi":"10.1109/ASAP.2010.5540793","DOIUrl":"https://doi.org/10.1109/ASAP.2010.5540793","url":null,"abstract":"The last decade was dominated by HW-SW convergence where designers learned to combine hardware and software design to cope with the increased demand of lower cost and increased performances. This starting decade will be dominated by the convergence between design technology (HW and SW) and fabrication technologies. In fact more and more designs require a deep knowledge of technology characteristics to reach the required performances. On the other side, design technologies are more and more used to overcome fabrication process imperfection and to improve yield. This talk will first explain the achievements in HW-SW convergence and SoC design. Then, it will address the fabrication technology trends and challenges to deal with this convergence.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"22 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82948061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of Systolic Array Concepts and Applications for Linear Algebra and Signal Processing 收缩阵列概念及其在线性代数和信号处理中的应用综述
K. Yao, F. Lorenzelli
Modern communication, control, avionic, and radar systems require the use of computationally intensive algebraic operations for real-time high throughput filtering, estimation, tracking, direction-of-arrival, and localization purposes. In this overview paper, we first review some basic systolic array (SA) concept, then SA algorithms for digital filtering, recursive least-squares, QR decomposition, Kalman filtering, eigenvalue and singular value decompositions will be discussed.
现代通信、控制、航空电子和雷达系统需要使用计算密集型代数操作来实现实时高吞吐量滤波、估计、跟踪、到达方向和定位目的。在这篇综述文章中,我们首先回顾了一些基本的收缩阵列(SA)概念,然后讨论了数字滤波、递归最小二乘、QR分解、卡尔曼滤波、特征值和奇异值分解中的收缩阵列算法。
{"title":"An Overview of Systolic Array Concepts and Applications for Linear Algebra and Signal Processing","authors":"K. Yao, F. Lorenzelli","doi":"10.1109/ASAP.2006.13","DOIUrl":"https://doi.org/10.1109/ASAP.2006.13","url":null,"abstract":"Modern communication, control, avionic, and radar systems require the use of computationally intensive algebraic operations for real-time high throughput filtering, estimation, tracking, direction-of-arrival, and localization purposes. In this overview paper, we first review some basic systolic array (SA) concept, then SA algorithms for digital filtering, recursive least-squares, QR decomposition, Kalman filtering, eigenvalue and singular value decompositions will be discussed.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"127 4 1","pages":"213"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83444551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Conference Chairs 会议主席的致辞
S. Gupta, V. Laks, Anthony K H Lakshmanan, Tung
For over a decade, the COMAD International Conference on Management of Data, modeled along the lines of ACM SIGMOD, has been the premier database conference hosted in India. It has been held on an approximately annual basis. This year, COMAD will be held in New Delhi during December 14-16, in the beautiful campus of the Indian Institute of Technology, renowned for its world class education and research. New Delhi, the capital city of India is a fusion of the ancient and the modern. Delhi unwinds a picture rich with culture, architecture and human diversity, deep in history, monuments, museums, galleries, gardens and exotic shows. It generates a mesmerizing charm reflecting well-composed and spacious streets under the shade of beautifully lined avenues of trees and tall and imposing government buildings.
十多年来,COMAD数据管理国际会议(以ACM SIGMOD为模板)一直是在印度主办的最重要的数据库会议。它大约每年举行一次。今年,COMAD将于12月14日至16日在新德里举行,地点是印度理工学院美丽的校园,该学院以其世界一流的教育和研究而闻名。新德里,印度的首都,是古代与现代的融合。德里展现了一幅丰富的文化、建筑和人类多样性的画面,历史悠久,有纪念碑、博物馆、画廊、花园和异国情调的表演。它产生了一种迷人的魅力,在林荫道和高大壮观的政府大楼的树荫下,反映出整洁宽敞的街道。
{"title":"Message from the Conference Chairs","authors":"S. Gupta, V. Laks, Anthony K H Lakshmanan, Tung","doi":"10.1109/ASAP.2006.45","DOIUrl":"https://doi.org/10.1109/ASAP.2006.45","url":null,"abstract":"For over a decade, the COMAD International Conference on Management of Data, modeled along the lines of ACM SIGMOD, has been the premier database conference hosted in India. It has been held on an approximately annual basis. This year, COMAD will be held in New Delhi during December 14-16, in the beautiful campus of the Indian Institute of Technology, renowned for its world class education and research. New Delhi, the capital city of India is a fusion of the ancient and the modern. Delhi unwinds a picture rich with culture, architecture and human diversity, deep in history, monuments, museums, galleries, gardens and exotic shows. It generates a mesmerizing charm reflecting well-composed and spacious streets under the shade of beautifully lined avenues of trees and tall and imposing government buildings.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiplication Algorithms for Radix-2 RN-Codings and Two's Complement Multiplication Algorithms for Radix-2 RN-Codings and Two's Complement 基数-2 rn -编码的乘法算法和二元补数的乘法算法
Jean-Luc Beuchat, J. Muller
The RN-codings, where "RN" stands for "round to nearest", are particular cases of signed digit representations, for which rounding to nearest is always identical to truncation. In radix 2, booth recoding is an RN-coding. In this paper, we suggest several multiplication algorithms able to handle RN-codings, and we analyze their properties.
RN编码,其中“RN”代表“四舍五入”,是有符号数字表示的特殊情况,四舍五入总是与截断相同。在基数2中,展台编码是一种rn编码。在本文中,我们提出了几种能够处理rn编码的乘法算法,并分析了它们的性质。
{"title":"Multiplication Algorithms for Radix-2 RN-Codings and Two's Complement Multiplication Algorithms for Radix-2 RN-Codings and Two's Complement","authors":"Jean-Luc Beuchat, J. Muller","doi":"10.1109/ASAP.2005.45","DOIUrl":"https://doi.org/10.1109/ASAP.2005.45","url":null,"abstract":"The RN-codings, where \"RN\" stands for \"round to nearest\", are particular cases of signed digit representations, for which rounding to nearest is always identical to truncation. In radix 2, booth recoding is an RN-coding. In this paper, we suggest several multiplication algorithms able to handle RN-codings, and we analyze their properties.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"43 4 1","pages":"303-308"},"PeriodicalIF":0.0,"publicationDate":"2005-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83778520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Area - Time - Power and Design effort: the basic tradeoffs in Application Specific Systems 面积-时间-功率和设计努力:特定应用系统的基本权衡
M. Flynn
Application specific is always a tradeoff among competing design goals (or design parameters). In addition to the well established area (cost) - time (performance) - power metrics specific applications imply a relatively limited market so design cost becomes an especially important consideration. As technology offers increasing transistor density with lower cost power constraints limit frequency as the primary avenue to performance. The alternative is to use area (transistors) to recover performance putting an additional strain on the design budget. The search for flexibility in design without paying a significant area - time - power cost remains the primary problem for application specific and system on a chip (SoC) design.
特定于应用程序总是在相互竞争的设计目标(或设计参数)之间进行权衡。除了完善的面积(成本)-时间(性能)-功率指标外,特定应用意味着相对有限的市场,因此设计成本成为特别重要的考虑因素。随着技术的发展,晶体管密度的增加和成本的降低限制了频率成为提高性能的主要途径。另一种选择是使用面积(晶体管)来恢复性能,这给设计预算带来了额外的压力。在不付出显著面积-时间-功率成本的情况下寻求设计的灵活性仍然是特定应用和片上系统(SoC)设计的主要问题。
{"title":"Area - Time - Power and Design effort: the basic tradeoffs in Application Specific Systems","authors":"M. Flynn","doi":"10.1109/ASAP.2005.17","DOIUrl":"https://doi.org/10.1109/ASAP.2005.17","url":null,"abstract":"Application specific is always a tradeoff among competing design goals (or design parameters). In addition to the well established area (cost) - time (performance) - power metrics specific applications imply a relatively limited market so design cost becomes an especially important consideration. As technology offers increasing transistor density with lower cost power constraints limit frequency as the primary avenue to performance. The alternative is to use area (transistors) to recover performance putting an additional strain on the design budget. The search for flexibility in design without paying a significant area - time - power cost remains the primary problem for application specific and system on a chip (SoC) design.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"21 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2005-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82958823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design and Evaluation of a Network-Based Asynchronous Architecture for Cryptographic Devices 基于网络的异步加密设备体系结构设计与评价
Ljiljana Dilparic, D. Arvind
This paper presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.
本文提出了一种基于网络的异步架构,提高了加密设备对已知侧信道攻击的物理层安全性。这是通过在功能单元网络上利用并行执行和随机数据转发来解除相关功耗测量来实现的。指令并行执行,并在它们之间转发寄存器值,从而避免了寄存器库。在数据转发中使用秘密共享方案,消除了通过网络发送临界寄存器值的影响,这不会显著降低性能,并且对增加网络活动引起的噪声具有积极作用。仿真结果表明,与异步流水线结构相比,基于网络的结构对差分功率分析具有更强的鲁棒性。
{"title":"Design and Evaluation of a Network-Based Asynchronous Architecture for Cryptographic Devices","authors":"Ljiljana Dilparic, D. Arvind","doi":"10.1109/ASAP.2004.10017","DOIUrl":"https://doi.org/10.1109/ASAP.2004.10017","url":null,"abstract":"This paper presents a network-based asynchronous architecture that improves the physical-level security of cryptographic devices to known side-channel attacks. This is achieved by decorrelating power consumption measurements by exploiting parallel execution and randomised data-forwarding over a network of functional units. Instructions execute in parallel and forward register values between them, thereby avoiding the register bank. A secret-sharing scheme is used in data-forwarding to remove the effect of sending critical register values through the network, which does not significantly degrade performance and has a positive effect of increasing the noise due to network activity. The simulation results show that both the security threshold and the performance are improved, and the network-based architecture is more robust to differential power analysis when compared to the asynchronous pipelined architecture.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"27 1","pages":"191-201"},"PeriodicalIF":0.0,"publicationDate":"2004-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77786535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Digit-Serial Algorithm for the Discrete Logarithm Modulo 2k 离散对数模2k的数字串行算法
A. Fit-Florea, D. Matula
{"title":"A Digit-Serial Algorithm for the Discrete Logarithm Modulo 2k","authors":"A. Fit-Florea, D. Matula","doi":"10.1109/ASAP.2004.10033","DOIUrl":"https://doi.org/10.1109/ASAP.2004.10033","url":null,"abstract":"","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"120 1","pages":"236-246"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77967007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Challenges in the Design of Security-Aware Processors 安全感知处理器设计中的挑战
R. Lee
Summary form only given. Approaches to cyber security have focused on reactive measures, perimeter security and software implementations. In contrast, we propose a proactive approach to cyber security, where every component, hardware, software or networking, has secure or trustworthy operation as a primary design goal. Architecture for cyber security must be defined at many levels. At the foundational level, if we want core hardware and software to be more responsible for cyber security, what architectural features must be included? How do we translate business and personal security needs, in addition to military and national security needs, into scalable technology features? In this talk, we focus on processors as the engines of the Information Age upon which all software runs. What does it mean for a processor to be security-aware? We illustrate with a few examples. In the area of e-commerce and e-business, we discuss how the processor can make cyber transactions more trustworthy. Can cryptography algorithms, and security protocols, be radically accelerated to provide needed confidentiality, data integrity, digital signatures and user authentication, in an automatic and painless way? In the area of service availability, we discuss whether the processor can provide defenses against misuse of computers by malicious third parties. Are there ways processor architecture can be enhanced to detect, prevent or mitigate potentially disastrous Distributed Denial of Service attacks? What are the processor and software vendors��� responsibilities in providing best-effort security features? What are the technical, policy and social challenges in digital rights management (DRM) with regard to built-in anti-piracy mechanisms? Many of these issues have legal, economic, social and ethical aspects, in addition to technological possibilities and limitations. We propose that it is time to consider how technology in general, and processor architecture in particular, can be designed to facilitate greater security and trust in cyberspace transactions and services.
只提供摘要形式。网络安全的方法主要集中在被动措施、外围安全和软件实施上。相比之下,我们提出了一种积极主动的网络安全方法,其中每个组件,硬件,软件或网络,都将安全或可信赖的操作作为主要设计目标。网络安全架构必须在多个层面进行定义。在基础层面上,如果我们希望核心硬件和软件对网络安全承担更多责任,那么必须包括哪些架构特征?除了军事和国家安全需求外,我们如何将商业和个人安全需求转化为可扩展的技术功能?在这次演讲中,我们将把重点放在作为信息时代引擎的处理器上,所有的软件都是在处理器上运行的。处理器具有安全意识意味着什么?我们用几个例子来说明。在电子商务和电子商务领域,我们讨论处理器如何使网络交易更加可信。密码学算法和安全协议能否以自动和无痛的方式从根本上加速,以提供所需的机密性、数据完整性、数字签名和用户身份验证?在服务可用性方面,我们讨论处理器是否能够提供防御,防止恶意第三方滥用计算机。是否有方法可以增强处理器架构来检测、防止或减轻潜在的灾难性分布式拒绝服务攻击?处理器和软件供应商在提供最佳安全特性方面的责任是什么?就内置的反盗版机制而言,数字版权管理(DRM)的技术、政策和社会挑战是什么?除了技术上的可能性和局限性外,其中许多问题还涉及法律、经济、社会和伦理方面。我们建议,现在是时候考虑如何设计一般技术,特别是处理器架构,以促进网络空间交易和服务的安全性和信任度。
{"title":"Challenges in the Design of Security-Aware Processors","authors":"R. Lee","doi":"10.1109/ASAP.2003.1212824","DOIUrl":"https://doi.org/10.1109/ASAP.2003.1212824","url":null,"abstract":"Summary form only given. Approaches to cyber security have focused on reactive measures, perimeter security and software implementations. In contrast, we propose a proactive approach to cyber security, where every component, hardware, software or networking, has secure or trustworthy operation as a primary design goal. Architecture for cyber security must be defined at many levels. At the foundational level, if we want core hardware and software to be more responsible for cyber security, what architectural features must be included? How do we translate business and personal security needs, in addition to military and national security needs, into scalable technology features? In this talk, we focus on processors as the engines of the Information Age upon which all software runs. What does it mean for a processor to be security-aware? We illustrate with a few examples. In the area of e-commerce and e-business, we discuss how the processor can make cyber transactions more trustworthy. Can cryptography algorithms, and security protocols, be radically accelerated to provide needed confidentiality, data integrity, digital signatures and user authentication, in an automatic and painless way? In the area of service availability, we discuss whether the processor can provide defenses against misuse of computers by malicious third parties. Are there ways processor architecture can be enhanced to detect, prevent or mitigate potentially disastrous Distributed Denial of Service attacks? What are the processor and software vendors��� responsibilities in providing best-effort security features? What are the technical, policy and social challenges in digital rights management (DRM) with regard to built-in anti-piracy mechanisms? Many of these issues have legal, economic, social and ethical aspects, in addition to technological possibilities and limitations. We propose that it is time to consider how technology in general, and processor architecture in particular, can be designed to facilitate greater security and trust in cyberspace transactions and services.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"37 1","pages":"2-"},"PeriodicalIF":0.0,"publicationDate":"2003-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80336415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Storage Management in Process Networks using the Lexicographically Maximal Preimage 使用字典最大预映像的进程网络存储管理
A. Turjan, B. Kienhuis
At the Leiden embedded research center, we are developing a compiler called Compaan that automatically translates signal processing applications written in Matlab into Kahn process networks (KPNs). In general, these signal processing applications are data-flow intensive, requiring large storage capacities, usually represented by matrices. An important issue in Compaan is the derivation of a memory management mechanism that allows for efficient interprocess communication. This mechanism has previously been published and is called the extended linearization model (ELM). The controller needed in the ELM is derived using the Ehrhart theory, leading to a computational intensive procedure. We present a new approach to derive the ELM controller, based on the notion of lexicographically maximal preimage. Using polytope manipulations and parametric integer linear programming techniques, we get less computational intensive and easier to be derived controller implementation for the ELM.
在莱顿嵌入式研究中心,我们正在开发一种名为Compaan的编译器,它可以自动将用Matlab编写的信号处理应用程序转换为Kahn过程网络(kpn)。一般来说,这些信号处理应用是数据流密集型的,需要大的存储容量,通常用矩阵表示。Compaan中的一个重要问题是内存管理机制的派生,该机制允许高效的进程间通信。这种机制以前已经发表过,被称为扩展线性化模型(ELM)。ELM所需的控制器使用Ehrhart理论推导,导致计算密集的过程。提出了一种基于字典最大原像的ELM控制器的推导方法。利用多面体操作和参数整数线性规划技术,我们可以减少计算量,更容易推导出ELM的控制器实现。
{"title":"Storage Management in Process Networks using the Lexicographically Maximal Preimage","authors":"A. Turjan, B. Kienhuis","doi":"10.1109/ASAP.2003.1212831","DOIUrl":"https://doi.org/10.1109/ASAP.2003.1212831","url":null,"abstract":"At the Leiden embedded research center, we are developing a compiler called Compaan that automatically translates signal processing applications written in Matlab into Kahn process networks (KPNs). In general, these signal processing applications are data-flow intensive, requiring large storage capacities, usually represented by matrices. An important issue in Compaan is the derivation of a memory management mechanism that allows for efficient interprocess communication. This mechanism has previously been published and is called the extended linearization model (ELM). The controller needed in the ELM is derived using the Ehrhart theory, leading to a computational intensive procedure. We present a new approach to derive the ELM controller, based on the notion of lexicographically maximal preimage. Using polytope manipulations and parametric integer linear programming techniques, we get less computational intensive and easier to be derived controller implementation for the ELM.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"23 1","pages":"75-85"},"PeriodicalIF":0.0,"publicationDate":"2003-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76170091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
GFS: An Efficient Implementation of Fair Scheduling for Mult-Gigabit Packet Networks GFS:多千兆分组网络公平调度的有效实现
Georgios Kornaros, T. Orphanoudakis, I. Papaefstathiou
In order to address the challenge of providing quality of service guarantees in today's network processing systems, the use of efficient scheduling algorithms is required. The efficiency of a scheduler is determined by several factors including its fairness, capability to operate at high speeds, as well as the resources required for its implementation. We present an architecture to support fair scheduling (gigabit FS) considering variable length packets (i. e. for packet forwarding/switching networks) over gigabit links. This high speed scheduler is designed to manage 32 K flows based on an algorithm that yields efficient implementation in hardware by avoiding the complexity of computing the system virtual time function that many packet fair queueing (PFQ) algorithms have proposed. Further, we demonstrate the critical factors in designing an effective scheduling engine at gigabit rates and we present several enhancements together with their associated cost.
为了解决在当今网络处理系统中提供服务质量保证的挑战,需要使用高效的调度算法。调度器的效率由几个因素决定,包括它的公平性、高速运行的能力以及实现所需的资源。我们提出了一个架构,以支持公平调度(千兆FS)考虑可变长度的数据包(即数据包转发/交换网络)在千兆链路。该高速调度器设计用于管理32k流,基于一种算法,该算法通过避免许多包公平排队(PFQ)算法所提出的计算系统虚拟时间函数的复杂性,从而在硬件上实现高效。此外,我们还演示了在千兆速率下设计有效调度引擎的关键因素,并介绍了几种增强功能及其相关成本。
{"title":"GFS: An Efficient Implementation of Fair Scheduling for Mult-Gigabit Packet Networks","authors":"Georgios Kornaros, T. Orphanoudakis, I. Papaefstathiou","doi":"10.1109/ASAP.2003.1212862","DOIUrl":"https://doi.org/10.1109/ASAP.2003.1212862","url":null,"abstract":"In order to address the challenge of providing quality of service guarantees in today's network processing systems, the use of efficient scheduling algorithms is required. The efficiency of a scheduler is determined by several factors including its fairness, capability to operate at high speeds, as well as the resources required for its implementation. We present an architecture to support fair scheduling (gigabit FS) considering variable length packets (i. e. for packet forwarding/switching networks) over gigabit links. This high speed scheduler is designed to manage 32 K flows based on an algorithm that yields efficient implementation in hardware by avoiding the complexity of computing the system virtual time function that many packet fair queueing (PFQ) algorithms have proposed. Further, we demonstrate the critical factors in designing an effective scheduling engine at gigabit rates and we present several enhancements together with their associated cost.","PeriodicalId":6642,"journal":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","volume":"16 1","pages":"389-399"},"PeriodicalIF":0.0,"publicationDate":"2003-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88268221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1