Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 145, Issue CDec 2023
Publisher:
  • Elsevier North-Holland, Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISSN:1383-7621
Skip Table Of Content Section
Research Paper
research-article
rShare: Alleviating long startup on the Cloud-rendering platform through de-systemization
Abstract

WebGL paves the way for the great development of lightweight rendering applications (e.g., web games). However, the target audience of Cloud-rendering frameworks (e.g., Google Stadia and gRemote) mainly focuses on native applications, called ...

research-article
On the methodology of three-way structured merge in version control systems: Top-down, bottom-up, or both
Abstract

Three-way merging is an essential component of version control systems. Despite the efficiency of the conventional line-based textual methods, syntax-based structured approaches have demonstrated benefits in improving merge accuracy. Prior ...

research-article
On-the-fly bisimulation equivalence checking for fresh-register automata
Abstract

Register automata are one of the simplest classes of automata that operate on infinite input alphabets. Each automaton comes equipped with a finite set of registers where it can store data values and compare them with others from the input. Fresh-...

research-article
COMPAD: A heterogeneous cache-scratchpad CPU architecture with data layout compaction for embedded loop-dominated applications
Abstract

The growing trend of pervasive computing has consolidated the everlasting need for power efficient devices. The conventional cache subsystem of general-purpose CPUs, while being able to adapt to many use cases, suffers from energy inefficiencies ...

research-article
Impact of priority assignment on schedule-based attacks in real-time embedded systems
Abstract

In this paper, we investigate the impact of priority assignment on schedule-based attacks in fixed-priority real-time systems. Through the schedule-based attacks, attackers may manipulate the input and output buffers of victim tasks, cause ...

research-article
TC-SEPM: Characterizing soft error resilience of CNNs on Tensor Cores from program and microarchitecture perspectives
Abstract

As an architectural CNN accelerator integrated into NVIDIA’s GPUs, existing research mainly focuses on improving the performance of Tensor Cores. However, the highly integrated Tensor Cores are vulnerable to transient faults (i.e., soft errors), ...

Highlights

  • The first work to predict the soft error resilience of CNNs on Tensor Cores.
  • The first work to make a hardware–software co-exploration on reliability-relevant features.
  • A valuable tool for programmers or architects due to its high ...

research-article
Maximising mobile user experience through self-adaptive content- and ambient-aware display brightness scaling
Abstract

Display subsystems have become the predominant user interface on mobile devices, serving as both input and output interfaces. For a better quality of user experience (QoE), the display subsystem is expected to provide appropriate resolution and ...

research-article
A convertible neural processor supporting adaptive quantization for real-time neural networks
Abstract

This paper presents Stimpack, a responsive approach toward adaptive neural processing unit (NPU), aiming to satisfy service-level objectives (SLOs) under highly massive loads of neural network (NN) inference. Initially, Stimpack operates in a ...

research-article
A distributed message authentication scheme with reputation mechanism for Internet of Vehicles
Abstract

Real-time and interactive traffic information sharing systems are crucial in the Internet of Vehicles (IoV) as they enable vehicles to make informed decisions, thereby improving the efficiency of intelligent transportation systems (ITS). Message ...

research-article
A lattice-based designated-server public-key authenticated encryption with keyword search
Abstract

Public-key Encryption with Keyword Search (PEKS) provides an efficient way to search on encrypted cloud data. However, it cannot resist against off-line Inside Keyword Guessing Attacks (IKGA). To alleviate this issue, Huang and Li proposed the ...

Special issue on Embedded Software and Systems (ICESS2022)
research-article
A GPU-accelerated real-time human voice separation framework for mobile phones
Abstract

Mobile speech communication can experience significant degradation in quality when users are in a noisy acoustic environment. With the rapid development of artificial intelligence in recent years, deep learning based monaural speech separation ...

Special issue on International Conference on Reliable Software Technologies AEiC 2023
research-article
Monintainer: An orchestration-independent extensible container-based monitoring solution for large clusters
Abstract

Container virtualization has recently gained popularity due to its low performance and resource allocation overhead. The rise of this technology can be attributed to the advancement of cloud computing and the adoption of micro-services ...

Comments