Redeye: analog convnet image sensor architecture for continuous mobile vision

R LiKamWa, Y Hou, J Gao, M Polansky… - ACM SIGARCH …, 2016 - dl.acm.org
Continuous mobile vision is limited by the inability to efficiently capture image frames and
process vision features. This is largely due to the energy burden of analog readout circuitry …

Warped-slicer: Efficient intra-SM slicing through dynamic resource partitioning for GPU multiprogramming

Q Xu, H Jeon, K Kim, WW Ro… - ACM SIGARCH Computer …, 2016 - dl.acm.org
As technology scales, GPUs are forecasted to incorporate an ever-increasing amount of
computing resources to support thread-level parallelism. But even with the best effort …

Virtual private caches

KJ Nesbit, J Laudon, JE Smith - Proceedings of the 34th annual …, 2007 - dl.acm.org
Virtual Private Machines (VPM) provide a framework for Quality of Service (QoS) in CMP-
based computer systems. VPMs incorporate microarchitecture mechanisms that allow …

A safety-oriented platform for web applications

RS Cox, JG Hansen, SD Gribble… - 2006 IEEE Symposium …, 2006 - ieeexplore.ieee.org
This paper describes the architecture and implementation of the Tahoma Web browsing
system. Key to Tahoma is the browser operating system (BOS), a new trusted software layer …

Hardware-software integrated approaches to defend against software cache-based side channel attacks

J Kong, O Aciiçmez, JP Seifert… - 2009 IEEE 15th …, 2009 - ieeexplore.ieee.org
Software cache-based side channel attacks present serious threats to modern computer
systems. Using caches as a side channel, these attacks are able to derive secret keys used …

Learning-based SMT processor resource distribution via hill-climbing

S Choi, D Yeung - ACM SIGARCH Computer Architecture News, 2006 - dl.acm.org
The key to high performance in Simultaneous Multithreaded (SMT) processors lies in
optimizing the distribution of shared resources to active threads. Existing resource …

Verification of control flow based security properties

T Jensen, D Le Métayer, T Thorn - Proceedings of the 1999 …, 1999 - ieeexplore.ieee.org
A fundamental problem in software based security is whether local security checks inserted
into the code are sufficient to implement a global security property. We introduce a formalism …

Predictable performance in SMT processors: Synergy between the OS and SMTs

FJ Cazorla, PMW Knijnenburg… - IEEE Transactions …, 2006 - ieeexplore.ieee.org
Current operating systems (OS) perceive the different contexts of simultaneous
multithreaded (SMT) processors as multiple independent processing units, although, in …

Meeting points: using thread criticality to adapt multicore hardware to parallel regions

Q Cai, J González, R Rakvic, G Magklis… - Proceedings of the 17th …, 2008 - dl.acm.org
We present a novel mechanism, called meeting point thread characterization, to dynamically
detect critical threads in a parallel region. We define the critical thread the one with the …

Probabilistic job symbiosis modeling for SMT processor scheduling

S Eyerman, L Eeckhout - ACM SIGARCH Computer Architecture News, 2010 - dl.acm.org
Symbiotic job scheduling boosts simultaneous multithreading (SMT) processor performance
by co-scheduling jobs that havecompatible'demands on the processor's shared resources …