Architecting against Software Cache-Based Side-Channel Attacks
Using cache-like architectural components including data caches, instruction caches, or branch target buffers as a side channel, software cache-based side-channel attacks are able to derive secret keys used in cryptographic operations through legitimate ...
A Systematic Methodology to Generate Decomposable and Responsive Power Models for CMPs
Power modeling based on performance monitoring counters (PMCs) attracted the interest of researchers since it became a quick approach to understand the power behavior of real systems. Consequently, several power-aware policies use models to guide their ...
Expandable and Cost-Effective Network Structures for Data Centers Using Dual-Port Servers
A fundamental goal of data center networking is to efficiently interconnect a large number of servers with the low equipment cost. Several server-centric network structures for data centers have been proposed. They, however, are not truly expandable and ...
Generalization of an Enhanced ECC Methodology for Low Power PSRAM
Error control codes (ECCs) have been widely used to maintain the reliability of memories, but ordinary ECC codes are not suitable for memories with long codewords. For portable products, power reduction in memories with DRAM-like cells can be done by ...
Hybrid CPU Management for Adapting to the Diversity of Virtual Machines
As an important cornerstone for clouds, virtualization plays a vital role in building this emerging infrastructure. Virtual machines (VMs) with a variety of workloads may run simultaneously on a physical machine in the cloud platform. The scheduling ...
Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products
In this paper, we consider three-way split formulas for binary polynomial multiplication and Toeplitz matrix vector product (TMVP). We first recall the best known three-way split formulas for polynomial multiplication: the formulas with six recursive ...
L-Networks: A Topological Model for Regular 2D Interconnection Networks
A complete family of Cayley graphs of degree four, denoted as L-networks, is considered in this paper. L-networks are 2D mesh-based topologies with wrap-around connections. L-networks constitute a graph-based model which englobe many previously proposed ...
Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers
We present a nonintrusive concurrent error detection (CED) method for protecting the control logic of a contemporary floating-point unit (FPU). The proposed method is based on the observation that control logic errors lead to extensive data path ...
Modular Design of High-Throughput, Low-Latency Sorting Units
High-throughput and low-latency sorting is a key requirement in many applications that deal with large amounts of data. This paper presents efficient techniques for designing high-throughput, low-latency sorting units. Our sorting architectures utilize ...
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains
Channel assignment is a crucial problem for wireless networks, especially for noncooperative wireless networks, in which nodes are selfish. While there have been a few studies of noncooperative, multiradio channel assignment, most existing studies are ...
Optimizing Nonindexed Join Processing in Flash Storage-Based Systems
Flash memory-based disks (or simply flash disks) have been widely used in today's computer systems. With their continuously increasing capacity and dropping price, it is envisioned that some database systems will operate on flash disks in the near ...
ReCREW: A Reliable Flash-Dissemination System
In this paper, we explore a new form of dissemination that arises in distributed, mission-critical applications called Flash Dissemination. This involves the rapid dissemination of rich information to a large number of recipients in a very short period ...
RFID Support for Accurate 3D Localization
This paper pursues RFID support for localization, aiming to pinpoint an object in 3D space. Given a set of RFID tags and/or readers deployed as reference points at known locations in a hexahedron (like shipping container or storage room), a passive and ...
Binary Integer Decimal-Based Floating-Point Multiplication
This paper presents a multiplier that operates on binary integer decimal (BID) encoded decimal floating-point (DFP) numbers. It uses a single binary multiplier with carry-save feedback for both significand multiplication and rounding, and it is ...
Multiway Splitting Method for Toeplitz Matrix Vector Product
Computing the product of a Toeplitz matrix and a vector arises in various applications including cryptography. In this paper, we consider Toeplitz matrices and vectors with entries in $({\hbox{\rlap{I}\kern 2.0pt{\hbox{F}}}}_2)$. For improved efficiency ...
Strong Diagnosability and Conditional Diagnosability of Multiprocessor Systems and Folded Hypercubes
Using the comparison diagnosis model, this study proposes some useful sufficient conditions for determining the strong diagnosability $(t_{s}(G))$ and the conditional diagnosability $(t_{c}(G))$ of a system $(G)$. Applying these results to an $(n)$--...