2010 15th CSI International Symposium on Computer Architecture and Digital Systems最新文献

筛选
英文 中文
Towards energy-scalable data centers 朝着能源可扩展的数据中心发展
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623534
B. Falsafi
{"title":"Towards energy-scalable data centers","authors":"B. Falsafi","doi":"10.1109/CADS.2010.5623534","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623534","url":null,"abstract":"Technology forecasts indicate that device scaling will continue well into the next decade. Unfortunately, it is becoming extremely difficult to harness this increase in the number of transistors into performance due to a number of technological, circuit, architectural, methodological and programming challenges. In this talk, I will argue that the key emerging showstopper is power. Voltage scaling as a means to maintain a constant power envelope with an increase in transistor numbers is hitting diminishing returns. As such, to continue riding the Moore's law we need to look for drastic measures to cut power. This is definitely the case for server chips in future data centers, where abundant server parallelism, redundancy and 3D chip integration are likely to remove programming, reliability and bandwidth hurdles, leaving power as the only true limiter. I will present results backing this argument based on validated models for future server chips and parameters extracted from real commercial workloads. Then I use these results to project future research directions for data center hardware and software.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117350074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variation-aware task scheduling and power mode selection for MPSoC power optimization 变化感知任务调度和电源模式选择的MPSoC电源优化
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623596
M. Momtazpour, M. Goudarzi, Esmaeel Sanaei
{"title":"Variation-aware task scheduling and power mode selection for MPSoC power optimization","authors":"M. Momtazpour, M. Goudarzi, Esmaeel Sanaei","doi":"10.1109/CADS.2010.5623596","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623596","url":null,"abstract":"Increasing delay and power variation has become a major challenge to designing high performance Multiprocessor System-On-Chips (MPSoC) in deep sub-micron technologies. As a result, a paradigm shift from deterministic to statistical design methodology at all levels of the design hierarchy is inevitable. In this paper, we propose a static variation-aware task scheduling and power mode selection algorithm for MPSoCs. The proposed algorithm is able to maximize the total power yield of the chip under a given performance yield constraint by searching for the optimal task scheduling and power mode selection policy for a specified multiprocessor platform. Experimental results are gathered by simulating the algorithm with two different statistical analysis methods called Monte Carlo and Event-Reference-Table-based method. We have shown that by considering both leakage and frequency variation during the simultaneous selection of task scheduling and power mode switching policies, our algorithm achieves significant improvement over conventional methods.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133779058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
M-ary parallel modular exponentiation: Software vs. hardware 并行模块化幂运算:软件vs.硬件
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623649
Sérgio de Souza Raposo, M. Santana, N. Nedjah, L. M. Mourelle
{"title":"M-ary parallel modular exponentiation: Software vs. hardware","authors":"Sérgio de Souza Raposo, M. Santana, N. Nedjah, L. M. Mourelle","doi":"10.1109/CADS.2010.5623649","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623649","url":null,"abstract":"Most of cryptographic systems are based on modular exponentiation. It is performed using successive modular multiplications. One way of improving the throughput of a cryptographic system implementation is reducing the number of the required modular multiplications. Existing methods attempt to reduce this number by partitioning the exponent in constant or variable size windows. In this paper, in the purpose of further accelerating the computation of modular exponentiation, a concurrent novel approach is proposed along with the corresponding software and hardware implementations.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117079957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A modulo 2n+1 multiplier with double-LSB encoding of residues 残数双lsb编码的模2n+1乘法器
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623600
G. Jaberipur, H. Alavi
{"title":"A modulo 2n+1 multiplier with double-LSB encoding of residues","authors":"G. Jaberipur, H. Alavi","doi":"10.1109/CADS.2010.5623600","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623600","url":null,"abstract":"Modulo 2n+1 adders and/or multipliers are used in digital filters, cryptographic systems, and digital signal processors based on residue number systems (RNS). The moduli set {2n−1, 2n, 2n+1} is popular in RNS applications, where the design of modulo 2n+1 multipliers is more challenging than the case of other two moduli. One reason is that the natural representation of residues in the range [0, 2n] requires n+1 bits. However, a number of modulo 2n+1 addition or multiplication schemes have used n-bit diminished-1 representation of residues, where zero operands are supposed to be treated separately. On the other hand, double-LSB encoding of modulo 2n+1 residues (i.e., an n-bit code word with a second least significant bit) has been used in the design of an efficient modulo 2n+1 adder. We are therefore motivated to study the impact of the double-lsb encoding of residues on the design of modulo 2n+1 multipliers. We describe the operation of such multipliers in dot-notation representation and show that the corresponding circuitry uses only standard off the shelf arithmetic cells such as full adders, half adders and carry look-ahead logic. Synthesis based comparison with previously reported multipliers shows the advantages of the proposed design.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"8 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126272392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Posibits, negabits, and their mixed use in efficient realization of arithmetic algorithms 正位,负位,以及它们在有效实现算术算法中的混合使用
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623646
G. Jaberipur, B. Parhami
{"title":"Posibits, negabits, and their mixed use in efficient realization of arithmetic algorithms","authors":"G. Jaberipur, B. Parhami","doi":"10.1109/CADS.2010.5623646","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623646","url":null,"abstract":"Positively weighted and negatively weighted bits (posibits, negabits) have been used in the interpretation of 2's-complement, negative-radix, and binary signed-digit number representation schemes as a way of facilitating the development of efficient arithmetic algorithms for various application domains. In this paper, we show that a more general view of posibits and negabits, along with their mixed use in any combination (using inverse encoding for negabits), unifies a number of diverse implementation schemes, while at the same time making the resultant designs more efficient by avoiding custom or modified hardware elements and restricting the implementation to the use of standard arithmetic cells. Such standard cells have been highly optimized and are continually improving due to their wide applicability. Other practical benefits of our formulation include facilitation of low-voltage and low-power design, again due to the widespread availability of standard cells in variants optimized for low-voltage operation or energy economy. Pedagogical benefits include more intuitive explanations for a number of widely used transformations, such as Booth's recoding and column compression.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
High throughput low power CCMP architecture for very high speed wireless LANs 用于超高速无线局域网的高吞吐量低功耗CCMP架构
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623530
S. A. Hoseini, Behnam Khodabandeloo, Mahdi Jelodari Mamaghani, P. Teymoori, N. Yazdani
{"title":"High throughput low power CCMP architecture for very high speed wireless LANs","authors":"S. A. Hoseini, Behnam Khodabandeloo, Mahdi Jelodari Mamaghani, P. Teymoori, N. Yazdani","doi":"10.1109/CADS.2010.5623530","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623530","url":null,"abstract":"Considering the pervasion of wireless portable devices and growing trends in the use of multimedia applications, access to a high speed and, especially, a high throughput wireless channel are of significant importance. In addition to security concerns in wireless devices, deficiency in throughput and also increase in power consumption are introduced to the system by applying security. Therefore, designing a secure, high-speed wireless device with low power consumption would be a suitable response to worldwide demands. In this paper, we propose a solution to reduce encryption overhead and we almost eliminate it. Furthermore, a customized hardware architecture for Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is proposed. This protocol is the fundamental security architecture of IEEE 802.11i standard. To improve throughput and reduce overhead, encryption is accomplished in the spare time intervals, such as DCF Inter-Frame Spaces (DIFS) used in IEEE 802.11i standard. In order to overcome the restrictions in dealing with these time intervals, a multi-core structure is proposed. Moreover, to reduce power consumption, a particular scheduler is implemented for processing cores. In the proposed architecture, we achieve up to 2Gbps throughput in the single core mode for MPDU (MAC Protocol Data Unit) and A-MSDU (Aggregated MAC Service Data Unit) input frames, and 17Gbps throughput in multi core mode for A-MPDU (Aggregated MPDU) input frames.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121018392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Designing many-core platforms for silicon-efficient embedded multimedia computing 为高效硅嵌入式多媒体计算设计多核平台
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623542
L. Benini
{"title":"Designing many-core platforms for silicon-efficient embedded multimedia computing","authors":"L. Benini","doi":"10.1109/CADS.2010.5623542","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623542","url":null,"abstract":"Programmability is a key requirement for fast time-to-market and agile adaptation to rapidly evolving multimedia standards and customer expectations. Unfortunately, programmable architectures come with order-of-magnitude computational density and energy efficiency gaps with respect to custom-fit hardware. Is there a way to escape the flexibility vs. efficiency dualism? Is nano-scale silicon technology adding new facets to this “no free lunch” view? In this talk I will describe key architectural and technology cornerstones of silicon-efficient throughput computing and provide some insight on how we hope to give positive answers to these fundamental questions.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the soft error effects on CAN network controller 软误差对CAN网络控制器的影响分析
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623594
Saman Khoshbakht, H. Zarandi
{"title":"Analysis of the soft error effects on CAN network controller","authors":"Saman Khoshbakht, H. Zarandi","doi":"10.1109/CADS.2010.5623594","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623594","url":null,"abstract":"In this article, the effects of the single event upset on a Controller Area Network (CAN) controller and its effects on the network is being evaluated. The experiment is done using SINJECT fault injection tool in a simulation based environment. Three mail modules of the controller are used in three independent set of experiments in one of the CAN controllers of the network. The results show that the main cause of the network failure is the bit stream processor. 6.7% of the injected faults in the bit stream processor led to the network failure. On the other hand, the registers sub-module of the controller showed to be most fault tolerant. The experiment showed that 0.3% of the faults in the registers module results in network failure, and the bit timing module is responsible for the failure of the whole network in 3.2% of the injected single event upset faults.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universal on-chip communication channel 通用片上通信通道
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-11-09 DOI: 10.1109/CADS.2010.5623547
M. Rahimian, S. Mohammadi
{"title":"Universal on-chip communication channel","authors":"M. Rahimian, S. Mohammadi","doi":"10.1109/CADS.2010.5623547","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623547","url":null,"abstract":"On-chip communication in mixed-clock systems has become a major issue; especially when asynchronous as well as multiple-clock-domain cores are used in a single chip. This paper proposes a new on-chip communication channel which can be used as asynchronous ⇒ synchronous, synchronous ⇒ asynchronous or synchronous ⇒ synchronous (mixed-clock) communication channel, all with the same design. The synchronization issue, i.e. the metastability, is analyzed; we show that its probability of occurring is practically zero in our designed channel. Because the routers in Asynchronous Network on Chips (ANoCs) are asynchronous and they have to communicate with synchronous cores, the proposed channel is well suited in such systems. Also, other mixed-clock SoCs can equally implement this channel as the interconnection between synchronous IP cores. The proposed channel is simulated in 90nm CMOS process using Predictive Technology Model (PTM) library with accurate Spice models. The throughput, latency and power consumption of our work are analyzed and compared with existing designs.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Quad Router design for next-generation CMPs 下一代cmp的四路路由器设计
2010 15th CSI International Symposium on Computer Architecture and Digital Systems Pub Date : 2010-09-01 DOI: 10.1109/CADS.2010.5623549
Hannaneh Aliee, H. Zarandi
{"title":"A Quad Router design for next-generation CMPs","authors":"Hannaneh Aliee, H. Zarandi","doi":"10.1109/CADS.2010.5623549","DOIUrl":"https://doi.org/10.1109/CADS.2010.5623549","url":null,"abstract":"This paper presents a router structure for Network-on-Chips called Quad Router which benefits from communication locality. The router can be shared among more than one Processing Element (PE), so the average hop count of a packet is decreased. This structure consists of eight input buffers and eight output ports by which two different topologies are introduced called Double-Link Mesh (DLM) and Crossbar Mesh (CM). In DLM topology, each Quad Router is connected to four immediate neighbors just like regular mesh topology, but with double links. In CM topology, each Quad Router is connected to eight neighbors in eight different directions. The main advantage of this architecture is reduction in packet latency because the PEs sharing a single Quad Router can connect directly to each other. Other advantages are drop in power and area overhead of the router. The experimental results show the effectiveness of the proposed topologies.","PeriodicalId":145317,"journal":{"name":"2010 15th CSI International Symposium on Computer Architecture and Digital Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信