Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
EMI: Energy Management Meets Imputation in Wearable IoT Devices
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3792–3803https://doi.org/10.1109/TCAD.2024.3448379Wearable and Internet of Things (IoT) devices are becoming popular in several applications, such as health monitoring, wide area sensing, and digital agriculture. These devices are energy-constrained due to limited battery capacities. As such, IoT devices ...
- research-articleNovember 2024
GEAR: Graph-Evolving Aware Data Arranger to Enhance the Performance of Traversing Evolving Graphs on SCM
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3674–3684https://doi.org/10.1109/TCAD.2024.3447222In the era of big data, social network services continuously modify social connections, leading to dynamic and evolving graph data structures. These evolving graphs, vital for representing social relationships, pose significant memory challenges as they ...
- research-articleNovember 2024
HMC-FHE: A Heterogeneous Near Data Processing Framework for Homomorphic Encryption
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3551–3563https://doi.org/10.1109/TCAD.2024.3447212Fully homomorphic encryption (FHE) offers a promising solution to ensure data privacy by enabling computations directly on encrypted data. However, its notorious performance degradation severely limits the practical application, due to the explosion of ...
- research-articleNovember 2024
High-Performance Remote Data Persisting for Key-Value Stores via Persistent Memory Region
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3828–3839https://doi.org/10.1109/TCAD.2024.3442992Key-value stores (KVStores), such as LevelDB and Redis, have been widely used in real-world production environments. To guarantee data durability and availability, traditional KVStores suffer from high write latency, mainly caused by the long network and ...
- research-articleNovember 2024
PARS: A Pattern-Aware Spatial Data Prefetcher Supporting Multiple Region Sizes
- Yiquan Lin,
- Wenhai Lin,
- Jiexiong Xu,
- Yiquan Chen,
- Zhen Jin,
- Jingchang Qin,
- Jiahao He,
- Shishun Cai,
- Yuzhong Zhang,
- Zonghui Wang,
- Wenzhi Chen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3638–3649https://doi.org/10.1109/TCAD.2024.3442981Hardware data prefetching is a well-studied technique to bridge the processor-memory performance gap. Bit-pattern-based prefetchers are one of the most promising spatial data prefetchers that achieve substantial performance gains. In bit-pattern-based ...
-
- research-articleNovember 2024
FlexBCM: Hybrid Block-Circulant Neural Network and Accelerator Co-Search on FPGAs
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3852–3863https://doi.org/10.1109/TCAD.2024.3439488Block-circulant matrix (BCM) compression has garnered much attention in the hardware acceleration of convolutional neural networks (CNNs) due to its regularity and efficiency. However, constrained by the difficulty of exploring the compression parameter ...
- research-articleNovember 2024
NOBtree: A NUMA-Optimized Tree Index for Nonvolatile Memory
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 11Pages 3840–3851https://doi.org/10.1109/TCAD.2024.3438111Nonvolatile memory (NVM) suffers from more serious nonuniform memory access (NUMA) effects than DRAM because of the lower bandwidth and higher latency. While numerous works have aimed at optimizing NVM indexes, only a few of them tried to address the NUMA ...
- research-articleJune 2024
Area-Efficient Barrett Modular Multiplication With Optimized Karatsuba Algorithm
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 12Pages 4626–4639https://doi.org/10.1109/TCAD.2024.3415017This article presents an area-efficient Barrett modular multiplication (BMM) algorithm, facilitating the development of cryptosystems like fully homomorphic encryption. Instead of implementing three normal multiplications required by classic BMM, our ...
- research-articleMay 2024
Smaller Together: Groupwise Encoding of Sparse Neural Networks
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 12Pages 4476–4489https://doi.org/10.1109/TCAD.2024.3402957With the drive toward ever more intelligent devices, neural networks (NNs) are deployed on smaller and smaller systems. For these embedded microcontrollers, memory consumption becomes a significant challenge. We propose multiple encoding schemes that ...
- research-articleMarch 2024
Complete Security Solution for Practical Quantum Network Coding
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 9Pages 2692–2704https://doi.org/10.1109/TCAD.2024.3382827Quantum network coding (QNC) is expected to enable multiple quantum data packets to be fused before the transmission via the bottleneck channel in order to improve the transmission efficiency and the total throughput of quantum networks. Although several ...
- research-articleSeptember 2023
H<sub>2</sub>B: Crypto Hash Functions Based on Hybrid Ring Generators
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 2Pages 442–455https://doi.org/10.1109/TCAD.2023.3320633Protection of integrated circuits (ICs) against hardware security threats has been tackled by many schemes proposed to mitigate risks associated with an unauthorized access and usage of ICs in general, and intellectual property (IP) cores in particular. ...
- research-articleAugust 2023
FedComp: A Federated Learning Compression Framework for Resource-Constrained Edge Computing Devices
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 1Pages 230–243https://doi.org/10.1109/TCAD.2023.3307459Top-K sparsification-based compression techniques are popular and powerful for reducing communication costs in federated learning (FL). However, existing Top-K sparsification-based compression methods suffer from two critical issues that severely hinder ...
- research-articleAugust 2023
Dynamic Test Compaction of a Compressed Test Set Shared Among Logic Blocks
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 43, Issue 1Pages 394–402https://doi.org/10.1109/TCAD.2023.3307352Distributed test data compression refers to the scenario where each logic block in a design has its own decompression logic and compact set of compressed tests. A static test compaction procedure for this scenario was described recently. The procedure ...
- research-articleMay 2023
EdgeCompress: Coupling Multidimensional Model Compression and Dynamic Inference for EdgeAI
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 42, Issue 12Pages 4657–4670https://doi.org/10.1109/TCAD.2023.3276938Convolutional neural networks (CNNs) have demonstrated encouraging results in image classification tasks. However, the prohibitive computational cost of CNNs hinders the deployment of CNNs onto resource-constrained embedded devices. To address this issue, ...
- research-articleApril 2023
PMEH: A Parallel and Write-Optimized Extendible Hashing for Persistent Memory
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 42, Issue 11Pages 3801–3814https://doi.org/10.1109/TCAD.2023.3271579Emerging persistent memory (PM) has the potential to substitute DRAM due to its near-DRAM performance and durability similar to disks. However, hash tables designed for DRAM cannot be directly adopted for PM. Moreover, prior studies on hash tables using ...
- research-articleFebruary 2023
Joint Optimization of Dimension Reduction and Mixed-Precision Quantization for Activation Compression of Neural Networks
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 42, Issue 11Pages 4025–4037https://doi.org/10.1109/TCAD.2023.3248503Recently, deep convolutional neural networks (CNNs) have achieved eye-catching results in various applications. However, intensive memory access of activations introduces considerable energy consumption, resulting in a great challenge for deploying CNNs ...
- research-articleNovember 2022
LLSM: A Lifetime-Aware Wear-Leveling for LSM-Tree on NAND Flash Memory
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 41, Issue 11Pages 3946–3956https://doi.org/10.1109/TCAD.2022.3197542The advancement of nonvolatile memory (NVM) technology reduces the cost-per-unit of solid-state drives (SSDs). Flash memory-based SSDs have become ubiquitous because they provide better performance and energy efficiency than hard disk drives. However, it ...
- research-articleNovember 2022
When B-Tree Meets Skyrmion Memory: How Skyrmion Memory Affects an Indexing Scheme<sup/>
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 41, Issue 11Pages 3814–3825https://doi.org/10.1109/TCAD.2022.3197519Because of large cell density, fast read/write performance, and no limited write cycles, magnetic skyrmion racetrack memory (SK-RM) has been regarded as the next-generation main memory technology. However, the characteristics of SK-RM are not friendly for ...
- research-articleJanuary 2022
EMT: Elegantly Measured Tanner for Key-Value Store on SSD
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 41, Issue 1Pages 91–103https://doi.org/10.1109/TCAD.2021.3055489With the emergence of big data era, NoSQL key-value database is considered as a promising candidate for replacing relational database management system (RDBMS). As cost per GB of flash memory is getting closer to HDD, high performance solid state drive (...
- research-articleAugust 2020
Compiler-Based Techniques to Secure Cryptographic Embedded Software Against Side-Channel Attacks
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 39, Issue 8Pages 1550–1554https://doi.org/10.1109/TCAD.2019.2912924Side-channel attacks are a concrete and practical threat to the security of computing systems, ranging from high performance platforms to embedded devices. In this paper, we will provide a brief systematization of the current existing approaches to ...