Signal-Division-Aware Analog Circuit Topology Synthesis Aided by Transfer Learning
Compared with conventional analog circuit topology synthesis methods, the deep-reinforcement-learning (DRL)-based method features much higher synthesis efficiency while possessing the merit of strong generalization capability. However, this method cannot ...
HEDALS: Highly Efficient Delay-Driven Approximate Logic Synthesis
Approximate computing is an emerging paradigm for error-tolerant applications. By introducing a reasonable amount of inaccuracy, both the area and delay of a circuit can be reduced significantly. To produce approximate circuits automatically, many ...
ApproxTrain: Fast Simulation of Approximate Multipliers for DNN Training and Inference
Edge training of deep neural networks (DNNs) is a desirable goal for continuous learning; however, it is hindered by the enormous computational power required by training. Hardware approximate multipliers have shown their effectiveness in gaining resource ...
Data-Driven Feature Selection Framework for Approximate Circuit Design
The ever-growing data scale and computation complexity raise tremendous concerns about computer systems’ efficiency (i.e., lower hardware overhead and power consumption). Orthogonal to the advancement in semiconductor manufacturing technologies, ...
Model-to-Circuit Cross-Approximation For Printed Machine Learning Classifiers
Printed electronics (PEs) promises on-demand fabrication, low nonrecurring engineering costs, and subcent fabrication costs. It also allows for high customization that would be infeasible in silicon, and bespoke architectures prevail to improve the ...
AIoTML: A Unified Modeling Language for AIoT-Based Cyber–Physical Systems
Due to deeply intertwined physical and hardware/software components together with an increasing number of interconnected heterogeneous devices powered by artificial intelligence (AI) techniques, the design complexity of cyber–physical systems (CPSs)...
Hierarchical Relational Graph Learning for Autonomous Multirobot Cooperative Navigation in Dynamic Environments
As a specific kind of cyber–physical systems (CPSs), autonomous robot clusters play an important role in various intelligent manufacturing fields. However, due to the increasing design complexity of robot clusters, it is becoming more and more ...
<italic>VIGILANT</italic>: Vulnerability Detection Tool Against Fault-Injection Attacks for Locking Techniques
Logic locking is a well-known solution that thwarts design intellectual property (IP) piracy and prevents illegal overproduction of integrated circuits (ICs) against adversaries in the globalized supply chain. The widespread prevalence of reverse-...
Translation Validation of Information Leakage of Compiler Optimizations
The functional correctness of compiler optimization does not ensure the security properties of the source program. A functionally correct compiler optimization may introduce new security vulnerabilities in the optimized program. In a compiler, ensuring ...
ProMiSE: A High-Performance Programmable Hardware Monitor for High Security Enforcement of Software Execution
In recent years, to prevent computer systems from software attacks, hardware monitors are proposed as a type of efficient security enforcement scheme, which can detect software attacks at runtime. However, due to the limited flexibility of dedicated ...
FSMx-Ultra: Finite State Machine Extraction From Gate-Level Netlist for Security Assessment
Numerous security vulnerability assessment techniques urge precise and fast finite state machines (FSMs) extraction from the design under evaluation. Sequential logic locking, watermark insertion, fault-injection assessment of a system-on-a-chip (SoC) ...
On the Security of Sequential Logic Locking Against Oracle-Guided Attacks
The Boolean satisfiability (SAT) attack is an oracle-guided attack that can break most combinational logic locking schemes by efficiently pruning out all the wrong keys from the search space. Extending such an attack to sequential logic locking requires ...
Attacks on Recent DNN IP Protection Techniques and Their Mitigation
With the rapid increase in the development of deep learning methodologies, deep neural networks (DNNs) are now being commonly deployed in smart systems (e.g., autonomous vehicles) and high-end security applications (e.g., face recognition, biometric ...
Diagnosis of Malicious Bitstreams in Cloud Computing FPGAs
Multitenant field-programmable gate arrays (FPGAs) are increasingly being used in cloud computing technologies. Users are able to access the FPGA fabric remotely to implement custom accelerators in the cloud. However, the sharing of FPGA resources by ...
Computing Execution Times With Execution Decision Diagrams in the Presence of Out-of-Order Resources
We propose a precise and efficient pipeline analysis to tackle the problem of out-of-order resources in modern embedded microprocessors for the computation of the worst-case execution time (WCET). Such resources are prone to timing anomalies (Reineke et ...
Ulgen: A Runtime Assurance Framework for Programming Safe Cyber–Physical Systems
We present Ulgen, a runtime assurance (RTA) framework for programming safe cyber–physical systems (CPSs). In Ulgen, a system is implemented as a collection of asynchronous processes executing RTA modules which are generalizations of the well-known ...
TSAR-ILP: Tile-Based, Synchronization-AwaRe ILP Allocating Heterogeneous Platforms for Streaming Applications
Automatic design space exploration (DSE) is key in hardware-software (HW/SW) co-design. To cope with the large design space, explorations are often heuristic-based and/or approximate yielding potentially locally optimal solutions. Without knowing the ...
A Deterministic Embedded End-System Tightly Coupled With TSN Schedule
Distributed real-time systems (DRTSs) composed of many embedded end-systems have been widely adopted in the industrial fields. Time-sensitive networking (TSN), as a promising communication infrastructure for DRTS, has shown great potential in industry and ...
Design and Blocking Analysis of Locking Protocols for Real-Time DAG Tasks Under Federated Scheduling
Real-time systems require locking protocols to coordinate access to shared resources. With the booming revolution of parallel processing technology in real-time systems, there has been some work addressing the problem of extending classic locking ...
Energy-Aware Partitioned Scheduling of Imprecise Mixed-Criticality Systems
We consider partitioned scheduling of an imprecise mixed-criticality (IMC) taskset on a uniform multiprocessor platform, with the earliest deadline first-virtual deadline (EDF-VD) as the uniprocessor task scheduling algorithm, and address the optimization ...
ELIXIR: An Expedient Connection Paradigm for Self-Powered IoT Devices
IoT devices usually work under power-constrained scenarios like outdoor environmental monitoring. Considering the cost and sustainability, in the long run, energy-harvesting technology is preferable for powering IoT devices. Since harvesting power is ...
Dedicated Instruction Set for Pattern-Based Data Transfers: An Experimental Validation on Systems Containing In-Memory Computing Units
In-memory computing (IMC) aims at solving the performance gap between CPU and memories introduced by the memory wall. However, general-purpose IMC does not consider the optimization of data transfers for patterns, such as stencils and convolutions. This ...
Timing-Aware Qubit Mapping and Gate Scheduling Adapted to Neutral Atom Quantum Computing
As a less developed but potential quantum technology, neutral atoms (NAs) can provide advantages, including higher qubit connectivity, longer-range interactions, and much more native multicontrol gates than superconductivity. Long-range interactions, ...
A Low Latency and Compact GCD Design Using an Intelligent Seed-Selection Scheme of LL-PRNG
Stochastic computing has shown great promise for a variety of applications, including image processing circuits, due to its design simplicity, and low power consumption. This work proposes a hardware efficient and low-latency implementation of the ...
A Generalized Residue Number System Design Approach for Ultralow-Power Arithmetic Circuits Based on Deterministic Bit-Streams
The peak power consumption has become an important concern in the hardware design process of some of today’s applications, such as energy harvesting (EH) and bio-implantable (BI) electronic devices. The limited peak harvested power in EH devices ...
PMEH: A Parallel and Write-Optimized Extendible Hashing for Persistent Memory
Emerging persistent memory (PM) has the potential to substitute DRAM due to its near-DRAM performance and durability similar to disks. However, hash tables designed for DRAM cannot be directly adopted for PM. Moreover, prior studies on hash tables using ...
SpikeSim: An End-to-End Compute-in-Memory Hardware Evaluation Tool for Benchmarking Spiking Neural Networks
Spiking neural networks (SNNs) are an active research domain toward energy-efficient machine intelligence. Compared to conventional artificial neural networks (ANNs), SNNs use temporal spike data and bio-plausible neuronal activation functions such as ...
FeFET-Based In-Memory Hyperdimensional Encoding Design
The data explosion of Internet of Things (IoT) and machine learning tasks raises a great demand on highly efficient computing hardware and paradigms. Brain-inspired hyperdimensional computing (HDC) is becoming a promising computing paradigm, which encodes ...
APPcache+: An STT-MRAM-Based Approximate Cache System With Low Power and Long Lifetime
Due to high static power and low scalability, the traditional SRAM-based cache is not a good solution for image processing applications. Emerging spin transfer torque magnetic RAM (STT-MRAM) is a promising candidate for cache due to its low leakage power ...
STREAM: Toward READ-Based In-Memory Computing for Streaming-Based Processing for Data-Intensive Applications
With the rise of data-intensive applications, traditional computing paradigms have hit the memory-wall. In-memory computing using emerging nonvolatile memory (NVM) technology is a promising solution strategy to overcome the limitations of the von-Neumann ...