Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 30, Issue 1January 2025
Reflects downloads up to 05 Mar 2025Bibliometrics
Skip Table Of Content Section
research-article
Open Access
Deadline and Period Assignment for Guaranteeing Timely Response of the Cyber-Physical System
Article No.: 1, Pages 1–26https://doi.org/10.1145/3689048

Cyber-physical systems (CPSs) need to respond to each change of each monitored object in time. The entire response process can be divided into two stages: the update stage and the control stage. Tasks in CPSs can thus be divided into two kinds: update ...

research-article
Open Access
Sensor-Aware Data Imputation for Time-Series Machine Learning on Low-Power Wearable Devices
Article No.: 2, Pages 1–27https://doi.org/10.1145/3698195

Wearable devices that have low-power sensors, processors, and communication capabilities are gaining wide adoption in several health applications. The machine learning algorithms on these devices assume that data from all sensors are available during ...

research-article
Performance Analysis of CNN Inference/Training with Convolution and Non-Convolution Operations on ASIC Accelerators
Article No.: 3, Pages 1–34https://doi.org/10.1145/3696665

Today’s performance analysis frameworks for deep learning accelerators suffer from two significant limitations. First, although modern convolutional neural networks (CNNs) consist of many types of layers other than convolution, especially during training, ...

research-article
Layout Congestion Prediction Based on Regression-ViT
Article No.: 4, Pages 1–21https://doi.org/10.1145/3698196

To accelerate the back-end design flow of integrated circuit (IC), numerous studies have made exploratory advancements in machine learning (ML) for electronic design automation (EDA). However, most research works are limited to deep learning (DL) models ...

research-article
Open Access
Area-driven Boolean bi-decomposition by function approximation
Article No.: 5, Pages 1–21https://doi.org/10.1145/3698879

Bi-decomposition rewrites logic functions as the composition of simpler components. It is related to Boolean division, where a given function is rewritten as the product of a divisor and a quotient, but bi-decomposition can be defined for any Boolean ...

research-article
Open Access
SHAREDD: Sharing of Test Data and Design-for-Testability Logic for Transition Fault Tests under Standard Scan
Article No.: 6, Pages 1–13https://doi.org/10.1145/3698198

High reliability requirements in certain systems are combined with constraints on test overheads, including test data volume, test application time and design-for-testability (DFT) logic. The overheads can be reduced if they are shared among different ...

research-article
PROTECTS: Progressive Rtl Obfuscation with ThrEshold Control Technique during architectural Synthesis
Article No.: 7, Pages 1–34https://doi.org/10.1145/3701032

Due to the supply chain globalization of the semiconductor industry, securing heterogeneous System-on-Chip (SoC) is becoming necessary. A malicious alteration, inserting Hardware Trojan, infringement, or counterfeiting of design via Reverse Engineering (...

research-article
STCO: Enhancing Training Efficiency via Structured Sparse Tensor Compilation Optimization
Article No.: 8, Pages 1–22https://doi.org/10.1145/3701033

Network sparsification serves as an effective technique to accelerate Deep Neural Network (DNN) inference. However, existing sparsification techniques often rely on structured sparsity, which yields limited benefits. This is primarily due to the ...

research-article
Open Access
Fast Candidate Screening for Post-diagnosis Refinement
Article No.: 9, Pages 1–21https://doi.org/10.1145/3698197

Oftentimes fault candidates produced by logic diagnosis are too many to effectively guide the follow-on failure analysis. In this work, we propose a novel two-stage fast screening method to sift through a large of candidates in the fault callout outputted ...

research-article
Open Access
A Cascaded ReRAM-based Crossbar Architecture for Transformer Neural Network Acceleration
Article No.: 10, Pages 1–23https://doi.org/10.1145/3701034

Emerging resistive random-access memory (ReRAM) based processing-in-memory (PIM) accelerators have been increasingly explored in recent years because they can efficiently perform in-situ matrix-vector multiplication (MVM) operations involved in a wide ...

research-article
Real-time Blood Pressure Prediction on Wearables with Edge-Based DNNs: A Co-Design Approach
Article No.: 11, Pages 1–24https://doi.org/10.1145/3699512

This paper presents the hardware realization of a real-time blood pressure (BP) prediction model for wearable devices, utilizing long short-term memory (LSTM) deep neural networks (DNNs). The proposed system uses both electrocardiogram (ECG) and ...

research-article
DeLoSo: Detecting Logic Synthesis Optimization Faults Based on Configuration Diversity
Article No.: 12, Pages 1–26https://doi.org/10.1145/3701232

Logic synthesis tools are the core components of digital circuit design, which convert programs written in hardware description languages into gate-level netlists and optimize the netlists. However, the netlist optimization is complex, with numerous ...

research-article
Open Access
Watch Out for the Inherent Vulnerabilities in Developing Multi-tenant Cloud-FPGA: Communication Protocols
Article No.: 13, Pages 1–24https://doi.org/10.1145/3702324

As FPGAs are being deployed in the cloud infrastructure for acceleration, the technology of multi-tenant FPGA has emerged as a topic of interest. This development has drawn considerable attention to its security issues. While previous research primarily ...

research-article
Open Access
Adversarial Circuit Rewriting against Graph Neural Network-based Operator Detection
Article No.: 14, Pages 1–19https://doi.org/10.1145/3703911

Recent work has shown that graph neural networks (GNNs) can be used to recover high-level word operators and their boundaries in gate-level netlists. Unlike formal methods, however, the GNN does not prove functional equivalence. As such, there is a ...

research-article
SafeTI: A Hardware Traffic Injector for Complex MPSoC Platform Validation and Characterization
Article No.: 15, Pages 1–25https://doi.org/10.1145/3703910

Functional and timing validation of high performing safety-related platforms requires testing specific traffic patterns in the network-on-chip interconnects. Generally, testing needs to be performed by using software tests whose degree of control on the ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Subjects