Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 15, Issue 1February 2016
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1539-9087
EISSN:1558-3465
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices
Article No.: 1, Pages 1–28https://doi.org/10.1145/2808230

With the advent of ubiquitous computing and the Internet of Things (IoT), the security and privacy issues for various smart devices such as radio-frequency identification (RFID) tags and wireless sensor nodes are receiving increased attention from ...

research-article
Design of a High-Performance CDMA-Based Broadcast-Free Photonic Multi-Core Network on Chip
Article No.: 2, Pages 1–30https://doi.org/10.1145/2839301

Present-day focus on multicore research has not only increased computing power but also power- and bandwidth-efficient communication among cores. On-chip communication networks have become popular today because of their low energy use and modular ...

research-article
Beyond Cross-Section: Spatio-Temporal Reliability Analysis
Article No.: 3, Pages 1–16https://doi.org/10.1145/2794148

A computational system employed in safety-critical applications typically has reliability as a primary concern. Thus, the designer focuses on minimizing the device radiation-sensitive area, often leading to performance degradation. In this article, we ...

research-article
Preaveraging and Carry Propagate Approaches to Side-Channel Analysis of HMAC-SHA256
Article No.: 4, Pages 1–19https://doi.org/10.1145/2794093

Although HMAC-SHA has been standardized for over a decade, few published attacks on the single-cycle round implementation exist. In this research, new attack techniques are provided, for the first time, (1) to help to discriminate between values of ...

research-article
Dynamic Logging with Dylog in Networked Embedded Systems
Article No.: 5, Pages 1–25https://doi.org/10.1145/2807698

Event logging is an important technique for networked embedded systems like wireless sensor networks. It can greatly help developers to understand complex system behaviors and diagnose program bugs. Existing logging facilities do not well satisfy three ...

research-article
Power-Aware Design Techniques of Secure Multimode Embedded Systems
Article No.: 6, Pages 1–29https://doi.org/10.1145/2801152

Nowadays, embedded systems have been widely used in all types of application areas, some of which belong to the safety and reliability critical domains. The functional correctness and design robustness of the embedded systems involved in such domains ...

research-article
Energy-Aware Scheduling for Real-Time Systems: A Survey
Article No.: 7, Pages 1–34https://doi.org/10.1145/2808231

This article presents a survey of energy-aware scheduling algorithms proposed for real-time systems. The analysis presents the main results starting from the middle 1990s until today, showing how the proposed solutions evolved to address the evolution ...

research-article
Error Detector Placement for Soft Computing Applications
Article No.: 8, Pages 1–25https://doi.org/10.1145/2801154

The scaling of Silicon devices has exacerbated the unreliability of modern computer systems, and power constraints have necessitated the involvement of software in hardware error detection. At the same time, emerging workloads in the form of soft ...

research-article
TBES: Template-Based Exploration and Synthesis of Heterogeneous Multiprocessor Architectures on FPGA
Article No.: 9, Pages 1–27https://doi.org/10.1145/2816817

This article describes TBES, a software end-to-end environment for synthesizing multitask applications on FPGAs. The implementation follows a template-based approach for creating heterogeneous multiprocessor architectures. Heterogeneity stems from the ...

research-article
Theory and Application of Delay Constraints in Arbiter PUF
Article No.: 10, Pages 1–20https://doi.org/10.1145/2815621

Physically Unclonable Function (PUF) circuits are often vulnerable to mathematical model-building attacks. We theoretically quantify the advantage provided to an adversary by any training dataset expansion technique along the lines of security analysis ...

research-article
A Cache-Based Flash Translation Layer for TLC-Based Multimedia Storage Devices
Article No.: 11, Pages 1–28https://doi.org/10.1145/2820614

Current triple-level cell (TLC)-based solids-tate drives used in multimedia storage devices support multichannel access to increase capacity and throughput. Unfortunately, current state-of-the-art FTL algorithms must employ selective caching for ...

research-article
Exploiting Page Correlations for Write Buffering in Page-Mapping Multichannel SSDs
Article No.: 12, Pages 1–25https://doi.org/10.1145/2815622

Advanced solid-state disks (SSDs) have been equipped with page-mapping flash translation layers and multichannel architectures. The SSDs employ a RAM-based write buffer, which delays write requests for reducing write traffic, reorders requests for ...

research-article
Stable Greedy: Adaptive Garbage Collection for Durable Page-Mapping Multichannel SSDs
Article No.: 13, Pages 1–25https://doi.org/10.1145/2820613

Commodity solid state drives (SSDs) have recently begun involving the adoption of powerful controllers for multichannel flash management at the page level. However, many of these models still use primitive garbage-collection algorithms, because previous ...

research-article
Feasibility of Fork-Join Real-Time Task Graph Models: Hardness and Algorithms
Article No.: 14, Pages 1–28https://doi.org/10.1145/2809780

In the formal analysis of real-time systems, modeling of branching codes and modeling of intratask parallelism structures are two of the most important research topics. These two real-time properties are combined, resulting in the fork-join real-time ...

research-article
CUDA Leaks: A Detailed Hack for CUDA and a (Partial) Fix
Article No.: 15, Pages 1–25https://doi.org/10.1145/2801153

Graphics processing units (GPUs) are increasingly common on desktops, servers, and embedded platforms. In this article, we report on new security issues related to CUDA, which is the most widespread platform for GPU computing. In particular, details and ...

research-article
Structure Design of Wireless Sensor Nodes with Energy and Cost Awareness for Multichannel Signal Measurement
Article No.: 16, Pages 1–23https://doi.org/10.1145/2790300

This article aims to develop a design pattern of a wireless sensor node working in multichannel signal measurement for effectively lowering energy consumption and cost. The proposed design pattern enables the architecture of a wireless sensor node to ...

research-article
User-Centric Scheduling and Governing on Mobile Devices with big.LITTLE Processors
Article No.: 17, Pages 1–22https://doi.org/10.1145/2829946

Mobile applications will become progressively more complicated and diverse. Heterogeneous computing architectures like big.LITTLE are a hardware solution that allows mobile devices to combine computing performance and energy efficiency. However, ...

research-article
Data Flow Transformation for Energy-Efficient Implementation of Givens Rotation--Based QRD
Article No.: 18, Pages 1–23https://doi.org/10.1145/2837025

QR decomposition (QRD), a matrix decomposition algorithm widely used in embedded application domain, can be realized in a large number of valid processing sequences that differ significantly in the number of memory accesses and computations, and hence ...

research-article
A Logic-Based Benders Decomposition Approach for Mapping Applications on Heterogeneous Multicore Platforms
Article No.: 19, Pages 1–28https://doi.org/10.1145/2838733

The development of efficient methods for mapping applications on heterogeneous multicore platforms is a key issue in the field of embedded systems. In this article, a novel approach based on the Logic-Based Benders decomposition principle is introduced ...

research-article
Software-Based Selective Validation Techniques for Robust CGRAs Against Soft Errors
Article No.: 20, Pages 1–26https://doi.org/10.1145/2843943

Coarse-Grained Reconfigurable Architectures (CGRAs) are drawing significant attention since they promise both performances with parallelism and flexibility with reconfiguration. Soft errors (or transient faults) are becoming a serious design concern in ...

research-article
Public Access
Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems
Article No.: 21, Pages 1–24https://doi.org/10.1145/2847418

This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped with multiple sensors measuring the same physical variable. A malicious attacker may be able to disrupt system performance through compromising a ...

Subjects

Comments