Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3125502acmotherconferencesBook PagePublication PagesesweekConference Proceedingsconference-collections
CODES '17: Proceedings of the Twelfth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis Companion
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ESWEEK'17: THIRTEENTH EMBEDDED SYSTEM WEEK Seoul Republic of Korea October 15 - 20, 2017
ISBN:
978-1-4503-5185-0
Published:
15 October 2017

Reflects downloads up to 30 Nov 2024Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
research-article
Public Access
Small neural nets are beautiful: enabling embedded systems with small deep-neural-network architectures
Article No.: 1, Pages 1–10https://doi.org/10.1145/3125502.3125606

Over the last five years Deep Neural Nets have offered more accurate solutions to many problems in speech recognition, and computer vision, and these solutions have surpassed a threshold of acceptability for many applications. As a result, Deep Neural ...

research-article
A unified framework for throughput analysis of synchronous data flow graphs under memory constraints: work-in-progress
Article No.: 2, Pages 1–2https://doi.org/10.1145/3125502.3125535

Streaming applications are often modeled with Synchronous data flow graphs (SDFGs). A proper analysis of the models is helpful to predict the performance of a system. In this paper, we focus on the throughput analysis of memory-constrained SDFGs (MC ...

research-article
A PV aware data placement scheme for read performance improvement on LDPC based flash memory: work-in-progress
Article No.: 3, Pages 1–2https://doi.org/10.1145/3125502.3125549

This paper proposes to improve read performance of LDPC based flash memory by exploiting process variation (PV). The work includes three parts. First, a block grouping approach is proposed to classify the flash blocks based on their reliability. Second, ...

research-article
Exploring fast and slow memories in HMP core types: work-in-progress
Article No.: 4, Pages 1–2https://doi.org/10.1145/3125502.3125545

Studies have shown memory and computational needs vary independently across applications. Recent work has explored using hybrid memory technology (SRAM+NVM) in on-chip memories of multicore processors (CMPs) to support the varied needs of diverse ...

research-article
Alert-and-transfer: an evolutionary architecture for SSD-based storage systems
Article No.: 5, Pages 1–2https://doi.org/10.1145/3125502.3125536

Over the past few years, NAND flash-based Solid State Drives (SSDs) are progressively replacing Hard Disk Drives (HDDs) in various applications ranging from personal computers to large-scale storage servers, due to their high performance and low power ...

research-article
Trends, challenges and needs for lattice-based cryptography implementations: special session
Article No.: 6, Pages 1–3https://doi.org/10.1145/3125502.3125559

Advances in computing steadily erode computer security at its foundation, calling for fundamental innovations to strengthen the weakening cryptographic primitives and security protocols. At the same time, the emergence of new computing paradigms, such ...

research-article
Efficient arithmetic for lattice-based cryptography: special session paper
Article No.: 7, Pages 1–3https://doi.org/10.1145/3125502.3125543

Lattice-based cryptography is a promising family of post quantum algorithms. Contrary to other approaches, lattice-based primitives are extremely versatile and allow the realisation of several essential cryptographic primitives, such as encryption and ...

research-article
Hampering fault attacks against lattice-based signature schemes: countermeasures and their efficiency (special session)
Article No.: 8, Pages 1–3https://doi.org/10.1145/3125502.3125546

Research on physical attacks on lattice-based cryptography has seen some progress in recent years and first attacks and countermeasures have been described. In this work, we perform an exhaustive literature review on fault attacks on lattice-based ...

research-article
DOVE: pinpointing firmware security vulnerabilities via symbolic control flow assertion mining (work-in-progress)
Article No.: 9, Pages 1–2https://doi.org/10.1145/3125502.3125541

In the past decade, the number of reported security attacks exploiting unchecked input firmware values has been on the rise. To address this concerning trend, this work proposes a novel detection framework, called DOVE, capable of identifying unlikely ...

research-article
Remote detection of unauthorized activity via spectral analysis: work-in-progress
Article No.: 10, Pages 1–2https://doi.org/10.1145/3125502.3125552

Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. This paper presents a stand-off self-referencing technique for detecting unauthorized activity. The proposed technique ...

research-article
Communication optimization for thermal reliable many-core systems: work-in-progress
Article No.: 11, Pages 1–2https://doi.org/10.1145/3125502.3125539

System-level thermal management techniques normally map applications on non-adjacent cores to guarantee the safe temperature in many-core systems, while the communication efficiency will be oppositely affected by long-distance data transmission over ...

research-article
Towards the application of flask security architecture to SoC design: work-in-progress
Article No.: 12, Pages 1–2https://doi.org/10.1145/3125502.3125558

In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to ...

research-article
IR-level annotation strategy dealing with aggressive loop optimizations for performance estimation in native simulation: work-in-progress
Article No.: 13, Pages 1–2https://doi.org/10.1145/3125502.3125550

Originally developed for purely functional verification of software, native or host compiled simulation [6] has gained momentum, thanks to its considerable speedup compared to instruction set simulation (ISS). To obtain a performance model of the ...

research-article
A machine learning-based approach for power and thermal management of next-generation video coding on MPSoCs: work-in-progress
Article No.: 14, Pages 1–2https://doi.org/10.1145/3125502.3125533

High Efficiency Video Coding (HEVC) provides high efficiency at the cost of increased computational complexity followed by increased power consumption and temperature of current Multi-Processor Systems-on-Chip (MPSoCs). In this paper, we propose a ...

research-article
Public Access
Driving behavior modeling and estimation for battery optimization in electric vehicles: work-in-progress
Article No.: 15, Pages 1–2https://doi.org/10.1145/3125502.3125542

Battery and energy management methodologies such as automotive climate controls have been proposed to address the design challenges of driving range and battery lifetime in Electric Vehicles (EV). However, driving behavior estimation is a major factor ...

research-article
A power-efficient and high performance FPGA accelerator for convolutional neural networks: work-in-progress
Article No.: 16, Pages 1–2https://doi.org/10.1145/3125502.3125534

Recently, FPGAs have been widely used in the implementation of hardware accelerators for Convolutional Neural Networks (CNN), especially on mobile and embedded devices. However, most of these existing accelerators are designed with the same concept as ...

research-article
Heterogeneous redundancy to address performance and cost in multi-core SIMT: work-in-progress
Article No.: 17, Pages 1–2https://doi.org/10.1145/3125502.3125547

As manufacturing processes scale to smaller feature sizes and processors become more complex, it is becoming challenging to have fabricated devices that operate according to their specification in the first place: yield losses are mounting [3].

research-article
A fast online sequential learning accelerator for IoT network intrusion detection: work-in-progress
Article No.: 18, Pages 1–2https://doi.org/10.1145/3125502.3125532

Deployment of IoT devices for smart buildings and homes will offer a high level of comfortability with increased energy efficiency; but can also introduce potential cyber-attacks such as network intrusions via linked IoT devices. Due to the low-power ...

research-article
Retention state-aware energy management for efficient nonvolatile processors: work-in-progress
Article No.: 23, Pages 1–2https://doi.org/10.1145/3125502.3129535

Harvested energy is intrinsically unstable and program execution will be interrupted frequently. To solve this problem, nonvolatile processor (NVP) is proposed because it can back up volatile state before the system energy is depleted. However, the ...

research-article
Public Access
Data analytics enables energy-efficiency and robustness: from mobile to manycores, datacenters, and networks (special session paper)
Article No.: 27, Pages 1–10https://doi.org/10.1145/3125502.3125560

The amount of data generated and collected across computing platforms every day is not only enormous, but growing at an exponential rate. Advanced data analytics and machine-learning techniques have become increasingly essential to analyze and extract ...

research-article
Significance-driven adaptive approximate computing for energy-efficient image processing applications: special session paper
Article No.: 28, Pages 1–2https://doi.org/10.1145/3125502.3125554

With increasing resolutions the volume of data generated by image processing applications is escalating dramatically. When coupled with real-time performance requirements, reducing energy consumption for such a large volume of data is proving ...

research-article
Public Access
3D nanosystems enable embedded abundant-data computing: special session paper
Article No.: 29, Pages 1–2https://doi.org/10.1145/3125502.3125531

The world's appetite for abundant-data computing, where a massive amount of structured and unstructured data is analyzed, has increased dramatically. The computational demands of these applications, such as deep learning, far exceed the capabilities of ...

research-article
Exploiting quality-energy tradeoffs with arbitrary quantization: special session paper
Article No.: 30, Pages 1–2https://doi.org/10.1145/3125502.3125544

Approximate computing aims to expose and exploit quality vs. efficiency tradeoffs to enable ever-more demanding applications on energy-constrained devices such as smartphones, or IoT devices. This paper makes the case for arbitrary quantization as a ...

research-article
An efficient hardware design for cerebellar models using approximate circuits: special session paper
Article No.: 31, Pages 1–2https://doi.org/10.1145/3125502.3125537

The superior controllability of the cerebellum has motivated extensive interest in the development of computational cerebellar models. Many models have been applied to the motor control and image stabilization in robots. Often computationally complex, ...

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

Overall Acceptance Rate 280 of 864 submissions, 32%
YearSubmittedAcceptedRate
CODES+ISSS '131113128%
CODES+ISSS '121634829%
CODES+ISSS '081434431%
CODES+ISSS '052005025%
CODES '01834352%
CODES '99984041%
CODES/CASHE '98662436%
Overall86428032%