Redeye: analog convnet image sensor architecture for continuous mobile vision
Continuous mobile vision is limited by the inability to efficiently capture image frames and
process vision features. This is largely due to the energy burden of analog readout circuitry …
process vision features. This is largely due to the energy burden of analog readout circuitry …
Warped-slicer: Efficient intra-SM slicing through dynamic resource partitioning for GPU multiprogramming
As technology scales, GPUs are forecasted to incorporate an ever-increasing amount of
computing resources to support thread-level parallelism. But even with the best effort …
computing resources to support thread-level parallelism. But even with the best effort …
A safety-oriented platform for web applications
RS Cox, JG Hansen, SD Gribble… - 2006 IEEE Symposium …, 2006 - ieeexplore.ieee.org
This paper describes the architecture and implementation of the Tahoma Web browsing
system. Key to Tahoma is the browser operating system (BOS), a new trusted software layer …
system. Key to Tahoma is the browser operating system (BOS), a new trusted software layer …
Hardware-software integrated approaches to defend against software cache-based side channel attacks
J Kong, O Aciiçmez, JP Seifert… - 2009 IEEE 15th …, 2009 - ieeexplore.ieee.org
Software cache-based side channel attacks present serious threats to modern computer
systems. Using caches as a side channel, these attacks are able to derive secret keys used …
systems. Using caches as a side channel, these attacks are able to derive secret keys used …
Learning-based SMT processor resource distribution via hill-climbing
S Choi, D Yeung - ACM SIGARCH Computer Architecture News, 2006 - dl.acm.org
The key to high performance in Simultaneous Multithreaded (SMT) processors lies in
optimizing the distribution of shared resources to active threads. Existing resource …
optimizing the distribution of shared resources to active threads. Existing resource …
Verification of control flow based security properties
T Jensen, D Le Métayer, T Thorn - Proceedings of the 1999 …, 1999 - ieeexplore.ieee.org
A fundamental problem in software based security is whether local security checks inserted
into the code are sufficient to implement a global security property. We introduce a formalism …
into the code are sufficient to implement a global security property. We introduce a formalism …
Predictable performance in SMT processors: Synergy between the OS and SMTs
FJ Cazorla, PMW Knijnenburg… - IEEE Transactions …, 2006 - ieeexplore.ieee.org
Current operating systems (OS) perceive the different contexts of simultaneous
multithreaded (SMT) processors as multiple independent processing units, although, in …
multithreaded (SMT) processors as multiple independent processing units, although, in …
Meeting points: using thread criticality to adapt multicore hardware to parallel regions
Q Cai, J González, R Rakvic, G Magklis… - Proceedings of the 17th …, 2008 - dl.acm.org
We present a novel mechanism, called meeting point thread characterization, to dynamically
detect critical threads in a parallel region. We define the critical thread the one with the …
detect critical threads in a parallel region. We define the critical thread the one with the …
Probabilistic job symbiosis modeling for SMT processor scheduling
S Eyerman, L Eeckhout - ACM SIGARCH Computer Architecture News, 2010 - dl.acm.org
Symbiotic job scheduling boosts simultaneous multithreading (SMT) processor performance
by co-scheduling jobs that havecompatible'demands on the processor's shared resources …
by co-scheduling jobs that havecompatible'demands on the processor's shared resources …