ACM Great Lakes Symposium on VLSI最新文献

筛选
英文 中文
Efficient parallel beamforming for 3D ultrasound imaging 高效平行波束形成的三维超声成像
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591599
Pirmin Vogel, Andrea Bartolini, L. Benini
{"title":"Efficient parallel beamforming for 3D ultrasound imaging","authors":"Pirmin Vogel, Andrea Bartolini, L. Benini","doi":"10.1145/2591513.2591599","DOIUrl":"https://doi.org/10.1145/2591513.2591599","url":null,"abstract":"One of the most demanding tasks in state-of-the-art medical ultrasound systems is the localization of possible scatterers in the body based on received echoes. Digital beamforming involves the summation of all received echoes in each image point according to their time of flight, i.e., their delay. This requires the knowledge of the delays for all combinations of ultrasound transmitters, image points and receivers. Recent three-dimensional (3D) systems comprise thousands of transducer elements and millions of image points. Compared to traditional 2D systems, the total number of delays is several orders of magnitude larger.\u0000 In this paper, we present a new beamforming algorithm that exploitsthe inherent locality in the image formation and efficiently approximates the delays. Compared to latest proposed architectures, this results in 20 percent less arithmetic operations, and a reduction of the input/output (I/O) bandwidth and the total memory size by factors of 30 and 50, respectively.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A semi-formal approach for analog circuits behavioral properties verification 模拟电路行为特性验证的半形式化方法
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591578
Ons Lahiouel, Henda Aridhi, M. Zaki, S. Tahar
{"title":"A semi-formal approach for analog circuits behavioral properties verification","authors":"Ons Lahiouel, Henda Aridhi, M. Zaki, S. Tahar","doi":"10.1145/2591513.2591578","DOIUrl":"https://doi.org/10.1145/2591513.2591578","url":null,"abstract":"We propose an environment for the verification of analog circuits behavioral properties, where the circuit state space bounds are first computed using qualitative simulation. Then, their specified behavioral properties are verified on these bounds. The effectiveness of the method is illustrated with a tunnel diode oscillator.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129111543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Customizing an open source processor to fit in an ultra-low power cluster with a shared L1 memory 定制一个开源处理器,使其适合具有共享L1内存的超低功耗集群
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591569
Michael Gautschi, D. Rossi, L. Benini
{"title":"Customizing an open source processor to fit in an ultra-low power cluster with a shared L1 memory","authors":"Michael Gautschi, D. Rossi, L. Benini","doi":"10.1145/2591513.2591569","DOIUrl":"https://doi.org/10.1145/2591513.2591569","url":null,"abstract":"The OpenRISC processor core, featuring a flat pipeline and a low area footprint has been integrated in a multi-core ultra-low power (ULP) cluster with a shared multi-banked memory to exploit parallelism in the near-threshold regime. The micro-architecture has been optimized to support a shared L1 memory and to achieve a high value of instructions per cycle (IPC) per core. The proposed architecture achieves IPC results in the range of 0.88 and 1 in a set of benchmark applications which is an improvement of up to 83% with respect to the original OpenRISC implementation. Implemented in 28nm FDSOI technology, the proposed design achieves 177 MOPS when supplied at 0.6V near-threshold voltage. The energy efficiency at this workload is 90.07 MOPS/mW which is an improvement of 50% with respect to what can be achieved with an OpenRISC cluster based on the original micro-architecture.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Logic block and design methodology for via-configurable structured ASIC using dual supply voltages 使用双电源电压的可配置结构化ASIC的逻辑模块和设计方法
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591601
Ta-Kai Lin, Kuen-Wey Lin, Chang-Hao Chiu, Rung-Bin Lin
{"title":"Logic block and design methodology for via-configurable structured ASIC using dual supply voltages","authors":"Ta-Kai Lin, Kuen-Wey Lin, Chang-Hao Chiu, Rung-Bin Lin","doi":"10.1145/2591513.2591601","DOIUrl":"https://doi.org/10.1145/2591513.2591601","url":null,"abstract":"This paper presents a via-configurable logic block and a design methodology for realizing fine-grained dual-supply-voltage structured ASIC. Experiments with a 90nm process technology show that, given various timing budgets, our approach can achieve up to 44% energy reduction with 1.6% area overhead on level converters. Compared with GECVS, our approach converts up to 39% more high-supply voltage gates into low-supply voltage gates.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new DRAM architecture and its control method for the system power consumption 一种新的DRAM架构及其系统功耗控制方法
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591516
Y. Riho, K. Nakazato
{"title":"A new DRAM architecture and its control method for the system power consumption","authors":"Y. Riho, K. Nakazato","doi":"10.1145/2591513.2591516","DOIUrl":"https://doi.org/10.1145/2591513.2591516","url":null,"abstract":"Demands have been placed on dynamic random access memory (DRAM) to not only increase memory capacity and data transfer speed but also to reduce operating and standby currents. When a system uses DRAM, the restricted data retention time necessitates a re-write operation because each bit of the DRAM is stored as an amount of electrical charge in a storage capacitor. Power consumption for the refresh operation increases in proportion to memory capacity. According to a new proposed method the refresh operation frequency and its power consumption reduce to 1/(2 to the Nth) (N=1, 2, 3, 4) when full memory capacity is not required, by effectively extending the refresh operation interval. The proposal includes the conversion from 1 cell/bit to (2 to the Nth) cells/bit, which reduces the variation of retention times among memory cells. This leads the refresh operation frequency from 1/(2 to the Nth) to 1/(2 to the Nth) X 1/(2 to the Nth), while it accompanies the additional charging power for the composed memory cell. A system can select the best way of 1 cell/bit and (2 to the Nth) cells/bit from the total viewpoint, while all conventional functions and operations in the full array access mode are fully compatible.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On macro-fault: a new fault model, its implications on fault tolerance and manufacturing yield 宏观故障:一种新的故障模型及其对容错和制造良率的影响
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591556
T. Lam, Xing Wei, W. Jone, Yi Diao, Yu-Liang Wu
{"title":"On macro-fault: a new fault model, its implications on fault tolerance and manufacturing yield","authors":"T. Lam, Xing Wei, W. Jone, Yi Diao, Yu-Liang Wu","doi":"10.1145/2591513.2591556","DOIUrl":"https://doi.org/10.1145/2591513.2591556","url":null,"abstract":"A macro-fault is defined as a group of signal faults such that the errors induced cannot be observed unless two or more faults (either permanent or temporary) in the group happen simultaneously. Since adding a redundant (alternative) wire for an existing (target) wire can mask some certain faults of these two wires mutually, a macro-fault can be formed by redundant wire addition. The faults that are dominated by or equivalent to the masked faults are also included in the macro-fault. As the feature size of integrated circuit technologies continue to scale down, manufacturing fault-free chips is getting more difficult and fault tolerance techniques will become more critical. In the past, redundancy has been adopted for memory for improving fault tolerance. For critical circuit components, even the costly triple modular redundancy techniques have to be applied. In this work, we study the implications of our new fault model, macro-fault, on the potential impact on fault tolerance and manufacturing yield. Based on the findings, a heuristic approach based on redundant wire addition is designed for improving fault tolerance. The approach can be incorporated with other fault tolerance techniques to form a hierarchical cross-layer fault tolerance scheme.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel parallel adaptation of an implicit path delay grading method 一种新的并行自适应隐式路径延迟分级方法
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591539
Joseph Lenox, S. Tragoudas
{"title":"A novel parallel adaptation of an implicit path delay grading method","authors":"Joseph Lenox, S. Tragoudas","doi":"10.1145/2591513.2591539","DOIUrl":"https://doi.org/10.1145/2591513.2591539","url":null,"abstract":"For large modern circuits, it is desirable to trade hardware cost for time when making path delay fault coverage estimates, especially as a subroutine for ATPG and timing analysis solutions. A parallel adaptation of an established framework for implicit path delay fault grading on with a GPGPU implementation is presented. Experimental evaluation on a NVIDIA Tesla C2075 GPU shows on average 50x speedup against the basic version for the framework on an Intel Xeon E5504 host system. Over a 1200x speedup is observed against a single-threaded, more complex version in the framework which grades more faults.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling of the charging behavior of li-ion batteries based on manufacturer's data 基于制造商数据的锂离子电池充电行为建模
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591592
Alessandro Sassone, Donghwa Shin, Alberto Bocca, A. Macii, E. Macii, M. Poncino
{"title":"Modeling of the charging behavior of li-ion batteries based on manufacturer's data","authors":"Alessandro Sassone, Donghwa Shin, Alberto Bocca, A. Macii, E. Macii, M. Poncino","doi":"10.1145/2591513.2591592","DOIUrl":"https://doi.org/10.1145/2591513.2591592","url":null,"abstract":"The market of portable devices, wireless sensors, electric vehicles and storage systems has grown enormously in recent years. As a consequence, batteries and related technologies have become one of the major topics for researchers. Due to the large variety of applications in which batteries are involved, battery modeling is becoming an extremely important research topic. This relevance is witnessed by the number of papers addressing battery modeling.\u0000 This paper proposes a methodology to build a battery model for the charge phase of secondary Lithium-Ion batteries resorting on data available in battery datasheets.\u0000 The distinguishing feature of the proposed modeling methodology is that, even if the amount of information regarding the battery charge provided by manufacturers is, in most of the cases, very limited, it is able to extract anyway a model of the charging phase with a good amount of accuracy. Simulation results show, in fact, that the proposed model is able to accurately track the charge behavior with an average error of 1.35.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smart nodes of internet of things (IoT): a hardware perspective view & implementation 物联网智能节点:硬件视角与实现
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2597169
E. Sánchez-Sinencio
{"title":"Smart nodes of internet of things (IoT): a hardware perspective view & implementation","authors":"E. Sánchez-Sinencio","doi":"10.1145/2591513.2597169","DOIUrl":"https://doi.org/10.1145/2591513.2597169","url":null,"abstract":"A lot of efforts have been done on software layer to propose the idea of Internet of Things (IoT). However, the functionality of IoT highly depends on the implementation of its end nodes. And there is little attention about realization of such IoT Smart Nodes. As mixed signal IC researchers, we analyze the urgent needs of IoT Smart Nodes and their implementation challenges. We focus this talk on the two of the most important practical issues: energy harvesting & regulating, and wireless transceiver.\u0000 A high efficient self-sustained energy harvester inside the Smart Nodes can power numerous possibilities to IoT network. For the various inputs, it should accommodate nonlinear energy sources and achieve Maximum Power Point Tracking (MPPT).\u0000 As it is considered the most power hungry part, the wireless transceiver in the IoT Smart Nodes needs special focus to minimize its power consumption. The transceiver should adapt its power consumption based on the available amount of the energy and the amount of the transferred data in time","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124613299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures FPGA中的硬件木马攻击:威胁分析及有效对策
ACM Great Lakes Symposium on VLSI Pub Date : 2014-05-20 DOI: 10.1145/2591513.2591520
Sanchita Mal-Sarkar, A. Krishna, A. Ghosh, S. Bhunia
{"title":"Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures","authors":"Sanchita Mal-Sarkar, A. Krishna, A. Ghosh, S. Bhunia","doi":"10.1145/2591513.2591520","DOIUrl":"https://doi.org/10.1145/2591513.2591520","url":null,"abstract":"Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide range of embedded applications including signal processing, multimedia, and security. FPGA device production is often outsourced to off-shore facilities for economic reasons. This opens up the opportunities for insertion of malicious design alterations in the foundry, referred to as hardware Trojan attacks, to cause logical and physical malfunction. The vulnerability of these devices to hardware attacks raises security concerns regarding hardware and design assurance. In this paper, we analyze hardware Trojan attacks in FPGA considering diverse activation and payload characteristics and derive a taxonomy of Trojan attacks in FPGA. To our knowledge, this is the first effort to analyze Trojan threats in FPGA hardware. Next, we propose a novel redundancy-based protection approach based on Trojan tolerance that modifies the application mapping process to provide high-level of protection against Trojans of varying forms and sizes. We show that the proposed approach incurs significantly higher security at lower overhead than conventional fault-tolerance schemes by exploiting the nature of Trojans and reconfiguration of FPGA resources.","PeriodicalId":272619,"journal":{"name":"ACM Great Lakes Symposium on VLSI","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信