The simulation and analysis of complex spatiotemporal systems are crucial for expressing and solving chaotic dynamical systems such as those in Earth and environmental sciences. Understanding and computing physical pr...
详细信息
The proceedings contain 25 papers. The special focus in this conference is on Parallel Computational Technologies. The topics include: On a Template Programming Approach for Shared Memory Parallel Architectu...
ISBN:
(纸本)9783031388637
The proceedings contain 25 papers. The special focus in this conference is on Parallel Computational Technologies. The topics include: On a Template Programming Approach for Shared Memory Parallel architectures with Applications to the Fully Implicit Stokes Solver;parallel Computing in the Tikhonov Regularization Method for Solving the Inverse Problem of Chemical Kinetics;parallel Implementation of the Time-Reversal Mirror Method for Retrieving the Position and Type of a Seismic Source from Observational Data;parallel Implementation of Fast Algorithms in the Vortex Particle Method;Implementation of an Asymptotically Compact Algorithm for GPU simulation of an Acoustic Equation;quantum-Chemical simulation of High-Energy Azoxy Compounds;parallel Algorithms for simulation of the Suspension Transport in Coastal systems Based on the Explicit-Implicit and Splitting Schemes;parallel Numerical Implementation of Three-Dimensional Mathematical Models of Hydrodynamics Taking into Account Vertical Turbulent Exchange;comparison of Two Methods for modeling the Dynamics of Gas Flows in a Protoplanetary Disk;parallel Data Preprocessing Library for Neural Network Training;computermodeling of Metal Nanoclusters and Substrate Interaction at Mesoscopic Level;supercomputersimulation of Plasma Flow in the Diamagnetic Mode of Open Magnetic systems;computersimulation of the Three-Dimensional Synthesis of Phase Images of Nanometer Scale Objects;a Parallel Algorithm for a Two-Phase Gas-Solid-Particle Model with Chemical Reactions and Laser Radiation;MPI-Based Computational Algorithm for modeling a Cylindrical Catalyst Grain During Oxidative Regeneration;research of the Influence of the Thermal State of an Air-Intake Model on In-Flight Icing Conditions;An Efficient LRnLA Algorithm and Data Structure for Manycore and Multicore computers with Hierarchical Cache;Implementation of a Fuzzy Inference Method with Nonsingleton Fuzzification Based on CUDA and GPGPU Technologies;solving the Three-Dim
The selection of a Time-Sensitive Networking (TSN) shaping mechanism is a crucial design decision that impacts the Quality of Service (QoS) of applications and configuration complexity. However, current research has m...
详细信息
With the ever-expanding attack surface of low-cost processors in IoT applications, the interest in lightweight hardware support for improving their security is growing. While industry has already adopted mostly static...
详细信息
ISBN:
(纸本)9783031045806;9783031045790
With the ever-expanding attack surface of low-cost processors in IoT applications, the interest in lightweight hardware support for improving their security is growing. While industry has already adopted mostly static low-overhead mitigation approaches against code-injection attacks, the race against code-reuse attacks is not yet over. One commonly proposed measure against code-reuse attacks aims to enforce runtime-dynamic integrity. In contrast to runtime-dynamic remote attestation, which is limited by its periodic attestation interval (possibly hours or weeks), runtime-dynamic integrity enforcement performs runtime-integrity checking in parallel to the actual execution. This allows very short attack response times, ideally stopping all evil instructions in flight from actually taking effect. To guarantee a prevention-in-time, one requirement is a low latency trace of uncommitted instructions. This typically would require a deep and core-specific integration. As an abstraction layer, we present our highly portable Real-Time Lightweight Integrity enForcement intErface (RT-LIFE), which is optimized to provide the core's state (uncommitted instructions) to an arbitrary runtime-dynamic low-latency Security Enforcement Unit (SecEU) as early as possible, while minimizing the interface's area and clock frequency penalties. We demonstrate RT-LIFE for six very different RISC-V cores together with our initial control-flow-integrity-enforcing SecEU DExIE, discuss the hardware architecture and its timing in detail, and finally provide an open-source release of RT-LIFE.
This paper presents bandpass delta-sigma modulator (BP-Δ∑M) structures, which are specifically suited for frequency tuning. The structures are identified through stability analyses and comparisons between chain of r...
详细信息
Low-light scenes are common in fields such as autonomous driving, which tests the robustness of intelligent systems. This paper tests the performance of object detection in low-light scenes based on the YOLOv8n model....
详细信息
Smart computing has demonstrated huge potential for various application sectors such as personalized healthcare and smart robotics. Smart computing aims bringing computing close to the source where the data is generat...
详细信息
The proceedings contain 45 papers. The topics discussed include: just-in-time verification in ADL-based processor design;virtual prototyping for efficient multi-core ECU development of driver assistance systems;system...
ISBN:
(纸本)9781467322973
The proceedings contain 45 papers. The topics discussed include: just-in-time verification in ADL-based processor design;virtual prototyping for efficient multi-core ECU development of driver assistance systems;system modeling and multicore simulation using transactions;BADCO : behavioral application-dependent superscalar core model;an application-specific network-on-chip for control architectures in RF transceivers;a framework for efficient cache resizing;a tightly-coupled multi-core cluster with shared-memory HW accelerators;architecture-level fault-tolerance for biomedical implants;reconfigurable miniature sensor nodes for condition monitoring;counting stream registers: an efficient and effective snoop filter architecture;design space exploration in application-specific hardware synthesis for multiple communicating nested loops;and memory bounds for the distributed execution of a hierarchical synchronous data-flow graph.
Safety-critical industrial systems are subject to many stringent requirements, including non-functional design constraints that are essential for robustness, reliability, and safety. System timing is often treated as ...
详细信息
The proceedings contain 36 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Security and Safety in Urban Environments: Evaluating Threats and...
ISBN:
(纸本)9783031687372
The proceedings contain 36 papers. The special focus in this conference is on computer Safety, Reliability, and Security. The topics include: Security and Safety in Urban Environments: Evaluating Threats and Risks of Autonomous Last-Mile Delivery Robots;safe Road-Crossing by Autonomous Wheelchairs: A Novel Dataset and Its Evaluation;automating an Integrated Model-Driven Approach to Analysing the Impact of Cyberattacks on Safety;Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection;enhancing Tunnel Safety with Artery V2X simulation for Real-Time Risk Assessment;detecting and Mitigating Errors in Neural Networks;challenges and Limitations of Utilizing Multi-core/Heterogeneous Logic Elements in the Railway Signaling Applications;identifying Difficult Environmental Conditions with Scenario-Based Hazard and Fault Analysis;Using GPT-4 to Generate Failure Logic;towards an Argument Pattern for the Use of Safety Performance Indicators;enabling Theory-Based Continuous Assurance: A Coherent Approach with Semantics and Automated Synthesis;Managing Changing Product Liability Obligations Emerging from New Proposed EU Directive;reaching Consensus on System-of-systems Resilience Assurance: A Case of Mobility as a Service;a Deductive Approach to Safety Assurance: Formalising Safety Contracts with Subjective Logic;a New Approach to Creating Clear Operational Safety Arguments;including Defeaters in Quantitative Confidence Assessments for Assurance Cases;multivariate Security Breach Probability: The Gordon-Loeb Model with Copulas;quantum Machine Learning: Perspectives in Cybersecurity;Security modeling Challenges and Research Directions Around the ADVISE Meta Framework;Capability Ambient DO – A Usable Tool for Linux System Security;VUOS: A User-Space Hypervisor Based on System Call Hijacking;cyber Risk Propagation on Networks;where Do Safety and Security Mutually Reinforce? A Multi-level Model-Based Approach for a Consistent Interplay;a Flow-Based Credibilit
暂无评论