No abstract available.
Proceeding Downloads
Small neural nets are beautiful: enabling embedded systems with small deep-neural-network architectures
Over the last five years Deep Neural Nets have offered more accurate solutions to many problems in speech recognition, and computer vision, and these solutions have surpassed a threshold of acceptability for many applications. As a result, Deep Neural ...
A unified framework for throughput analysis of synchronous data flow graphs under memory constraints: work-in-progress
Streaming applications are often modeled with Synchronous data flow graphs (SDFGs). A proper analysis of the models is helpful to predict the performance of a system. In this paper, we focus on the throughput analysis of memory-constrained SDFGs (MC ...
A PV aware data placement scheme for read performance improvement on LDPC based flash memory: work-in-progress
This paper proposes to improve read performance of LDPC based flash memory by exploiting process variation (PV). The work includes three parts. First, a block grouping approach is proposed to classify the flash blocks based on their reliability. Second, ...
Exploring fast and slow memories in HMP core types: work-in-progress
Studies have shown memory and computational needs vary independently across applications. Recent work has explored using hybrid memory technology (SRAM+NVM) in on-chip memories of multicore processors (CMPs) to support the varied needs of diverse ...
Alert-and-transfer: an evolutionary architecture for SSD-based storage systems
Over the past few years, NAND flash-based Solid State Drives (SSDs) are progressively replacing Hard Disk Drives (HDDs) in various applications ranging from personal computers to large-scale storage servers, due to their high performance and low power ...
Trends, challenges and needs for lattice-based cryptography implementations: special session
Advances in computing steadily erode computer security at its foundation, calling for fundamental innovations to strengthen the weakening cryptographic primitives and security protocols. At the same time, the emergence of new computing paradigms, such ...
Efficient arithmetic for lattice-based cryptography: special session paper
Lattice-based cryptography is a promising family of post quantum algorithms. Contrary to other approaches, lattice-based primitives are extremely versatile and allow the realisation of several essential cryptographic primitives, such as encryption and ...
Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session)
Research on physical attacks on lattice-based cryptography has seen some progress in recent years and first attacks and countermeasures have been described. In this work, we perform an exhaustive literature review on fault attacks on lattice-based ...
DOVE: pinpointing firmware security vulnerabilities via symbolic control flow assertion mining (work-in-progress)
In the past decade, the number of reported security attacks exploiting unchecked input firmware values has been on the rise. To address this concerning trend, this work proposes a novel detection framework, called DOVE, capable of identifying unlikely ...
Remote detection of unauthorized activity via spectral analysis: work-in-progress
Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized activity. The proposed technique ...
Communication optimization for thermal reliable many-core systems: work-in-progress
System-level thermal management techniques normally map applications on non-adjacent cores to guarantee the safe temperature in many-core systems, while the communication efficiency will be oppositely affected by long-distance data transmission over ...
Towards the application of flask security architecture to SoC design: work-in-progress
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to ...
IR-level annotation strategy dealing with aggressive loop optimizations for performance estimation in native simulation: work-in-progress
Originally developed for purely functional verification of software, native or host compiled simulation [6] has gained momentum, thanks to its considerable speedup compared to instruction set simulation (ISS). To obtain a performance model of the ...
A machine learning-based approach for power and thermal management of next-generation video coding on MPSoCs: work-in-progress
High Efficiency Video Coding (HEVC) provides high efficiency at the cost of increased computational complexity followed by increased power consumption and temperature of current Multi-Processor Systems-on-Chip (MPSoCs). In this paper, we propose a ...
Driving behavior modeling and estimation for battery optimization in electric vehicles: work-in-progress
Battery and energy management methodologies such as automotive climate controls have been proposed to address the design challenges of driving range and battery lifetime in Electric Vehicles (EV). However, driving behavior estimation is a major factor ...
A power-efficient and high performance FPGA accelerator for convolutional neural networks: work-in-progress
Recently, FPGAs have been widely used in the implementation of hardware accelerators for Convolutional Neural Networks (CNN), especially on mobile and embedded devices. However, most of these existing accelerators are designed with the same concept as ...
Heterogeneous redundancy to address performance and cost in multi-core SIMT: work-in-progress
As manufacturing processes scale to smaller feature sizes and processors become more complex, it is becoming challenging to have fabricated devices that operate according to their specification in the first place: yield losses are mounting [3].
A fast online sequential learning accelerator for IoT network intrusion detection: work-in-progress
Deployment of IoT devices for smart buildings and homes will offer a high level of comfortability with increased energy efficiency; but can also introduce potential cyber-attacks such as network intrusions via linked IoT devices. Due to the low-power ...
Retention state-aware energy management for efficient nonvolatile processors: work-in-progress
Harvested energy is intrinsically unstable and program execution will be interrupted frequently. To solve this problem, nonvolatile processor (NVP) is proposed because it can back up volatile state before the system energy is depleted. However, the ...
Data analytics enables energy-efficiency and robustness: from mobile to manycores, datacenters, and networks (special session paper)
- Sudeep Pasricha,
- Janardhan Rao Doppa,
- Krishnendu Chakrabarty,
- Saideep Tiku,
- Daniel Dauwe,
- Shi Jin,
- Partha Pratim Pande
The amount of data generated and collected across computing platforms every day is not only enormous, but growing at an exponential rate. Advanced data analytics and machine-learning techniques have become increasingly essential to analyze and extract ...
Significance-driven adaptive approximate computing for energy-efficient image processing applications: special session paper
With increasing resolutions the volume of data generated by image processing applications is escalating dramatically. When coupled with real-time performance requirements, reducing energy consumption for such a large volume of data is proving ...
3D nanosystems enable embedded abundant-data computing: special session paper
- William Hwang,
- Mohamed M. Sabry Aly,
- Yash H. Malviya,
- Mingyu Gao,
- Tony F. Wu,
- Christos Kozyrakis,
- H.-S. Philip Wong,
- Subhasish Mitra
The world's appetite for abundant-data computing, where a massive amount of structured and unstructured data is analyzed, has increased dramatically. The computational demands of these applications, such as deep learning, far exceed the capabilities of ...
Exploiting quality-energy tradeoffs with arbitrary quantization: special session paper
Approximate computing aims to expose and exploit quality vs. efficiency tradeoffs to enable ever-more demanding applications on energy-constrained devices such as smartphones, or IoT devices. This paper makes the case for arbitrary quantization as a ...
An efficient hardware design for cerebellar models using approximate circuits: special session paper
The superior controllability of the cerebellum has motivated extensive interest in the development of computational cerebellar models. Many models have been applied to the motor control and image stabilization in robots. Often computationally complex, ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CODES+ISSS '13 | 111 | 31 | 28% |
CODES+ISSS '12 | 163 | 48 | 29% |
CODES+ISSS '08 | 143 | 44 | 31% |
CODES+ISSS '05 | 200 | 50 | 25% |
CODES '01 | 83 | 43 | 52% |
CODES '99 | 98 | 40 | 41% |
CODES/CASHE '98 | 66 | 24 | 36% |
Overall | 864 | 280 | 32% |