A summary of contributions made by significant papers from the first 25 years of the field-programmablelogic and applicationsconference (FPL) is presented. The 27 papers chosen represent those which have most strong...
详细信息
A summary of contributions made by significant papers from the first 25 years of the field-programmablelogic and applicationsconference (FPL) is presented. The 27 papers chosen represent those which have most strongly influenced theory and practice in the ***: Authors Leong and Lee acknowledge partial support from the Australian Research Council's Linkage Projects funding scheme (project number LP130101034) Zomojo Pty Ltd, and the Faculty of Engineering and Information Technologies, the University of Sydney, by the Faculty Research Cluster Program.
The significance and benefits of addressing classification tasks in Big Data applications is beyond any doubt. To do so, learning algorithms must be scalable to cope with such a high volume of data. The most suitable ...
详细信息
ISBN:
(纸本)9781509060344
The significance and benefits of addressing classification tasks in Big Data applications is beyond any doubt. To do so, learning algorithms must be scalable to cope with such a high volume of data. The most suitable option to reach this objective is by using a MapReduce programming scheme, in which algorithms are automatically executed in a distributed and fault tolerant way. Among different available tools that support this framework, Spark has emerged as a "de facto" solution when using iterative approaches. In this work, our goal is to design and implement an Evolutionary Fuzzy Rule Selection algorithm within a Spark environment. To do so, we build different local rule bases within each Map Task that are later optimized by means of a genetic process. With this procedure, we seek to minimize the total number of rules that are gathered by each Reduce task to obtain a compact and accurate Fuzzy Rule Based Classification System. In particular, we set the experimental framework in the scenario of imbalanced classification. Therefore, the final objective will be analyzing the best synergy between the novel Evolutionary Fuzzy Rule Selection algorithm and the solutions applied to cope with skewed class distributions, namely cost-sensitive learning, random under-sampling and random-oversampling.
Embedded systems are today, progressively present in many applications. The connectivity of all these devices to different telecommunication networks, and ul- timately to the Internet, has become the norm or is in the...
详细信息
Embedded systems are today, progressively present in many applications. The connectivity of all these devices to different telecommunication networks, and ul- timately to the Internet, has become the norm or is in the process of becoming so. However, transmitted critical data between these systems can be easily attacked by an intruder. Therefore, the security of multimedia information is today a great challenge of embedded communicating systems to be taken into account during the initial stages of the development of an embedded system and it must be considered simultaneously with current constraints (consumption, surface, etc.). This paper presents the development and hardware implementation using FPGA of a new chaos-based stream-cipher dedicated to real-time multimedia encryption for embedded applica- tions. Our solution is based on a VHDL description of a new stream chaos-based key generator including feedback chaotic synchronization. The proposed architecture is particularly attractive since it provides a high security and a good trade-off between performance and hardware resources.
In this paper, the fuzzy logic control (FLC) is presented to address the instability effects of constant power load, and how to regulate the output voltage of a DC-DC Boost converter. The constant power load has negat...
详细信息
In this paper, the fuzzy logic control (FLC) is presented to address the instability effects of constant power load, and how to regulate the output voltage of a DC-DC Boost converter. The constant power load has negative incremental resistance, which makes the system unstable under a small disturbance on the load. To evaluate the performance, the proposed method is simulated by a MATLAB-SIMULINK model. Furthermore, the proposed concept is validated experimentally using a fieldprogrammable gate Array FPGA-Based Hardware-in-the-Loop Simulation by hardware description language.
Machine to Machine forms the basis for the Internet of Things. Communication between machines using any communications protocol, including wired and wireless was referred as Machine to machine communication. In real-t...
详细信息
Many modern defenses rely on address space layout randomization (ASLR) to efficiently hide security-sensitive metadata in the address space. Absent implementation flaws, an attacker can only bypass such defenses by re...
详细信息
ISBN:
(纸本)9781538605424
Many modern defenses rely on address space layout randomization (ASLR) to efficiently hide security-sensitive metadata in the address space. Absent implementation flaws, an attacker can only bypass such defenses by repeatedly probing the address space for mapped (security-sensitive) regions, incurring a noisy application crash on any wrong guess. Recent work shows that modern applications contain idioms that allow the construction of crash-resistant code primitives, allowing an attacker to efficiently probe the address space without causing any visible crash. In this paper, we classify different crash-resistant primitives and show that this problem is much more prominent than previously assumed. More specifically, we show that rather than relying on labor-intensive source code inspection to find a few "hidden" application-specific primitives, an attacker can find such primitives semi-automatically, on many classes of real-world programs, at the binary level. To support our claims, we develop methods to locate such primitives in real-world binaries. We successfully identified 29 new potential primitives and constructed proof-of-concept exploits for four of them.
Vehicular Ad Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that bring many benefits and conveniences to improve the road safety and drive comfort in future tr...
详细信息
ISBN:
(纸本)9781538605424
Vehicular Ad Hoc Networks (VANETs) enable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that bring many benefits and conveniences to improve the road safety and drive comfort in future transportation systems. Sybil attack is considered one of the most risky threats in VANETs since a Sybil attacker can generate multiple fake identities with false messages to severely impair the normal functions of safety-related applications. In this paper, we propose a novel Sybil attack detection method based on Received Signal Strength Indicator (RSSI), Voiceprint, to conduct a widely applicable, lightweight and full-distributed detection for VANETs. To avoid the inaccurate position estimation according to predefined radio propagation models in previous RSSI-based detection methods, Voiceprint adopts the RSSI time series as the vehicular speech and compares the similarity among all received time series. Voiceprint does not rely on any predefined radio propagation model, and conducts independent detection without the support of the centralized infrastructure. It has more accurate detection rate in different dynamic environments. Extensive simulations and real-world experiments demonstrate that the proposed Voiceprint is an effective method considering the cost, complexity and performance.
Biomechanical properties have been revealed as potential biomarkers for distinguishing cancer cells from normal cells. In this work, we report a novel technique using a confining microchannel embedded with microelectr...
详细信息
ISBN:
(纸本)9781509030590
Biomechanical properties have been revealed as potential biomarkers for distinguishing cancer cells from normal cells. In this work, we report a novel technique using a confining microchannel embedded with microelectrodes for biomechanical phenotyping for floating human cells, including one normal breast cell line (MCF-10A) and two breast cancer cell lines (MCF-7 and MDA-MB-231). The floating cells move under a defined pressure profile along the microchannel, in which the cells deform dynamically under compression by the channel sidewalls. We adopt Hertz and Tatara models to convert the deformed cell shapes to cell diameters and transient stress-strain ratios. By further considering the cell viscoelasticity as a Standard Linear Solid (SLS) model, we compute for whole-cell viscosity, and instantaneous and relaxed moduli. Our results show that the selected cell types have significant different viscoelastic properties. applications of the electrode-embedded confining microchannel can achieve high-throughput, continuous-flow deep phenotyping of rare cells by functionalizing channel side walls with antibodies for both biomechanical and biochemical biomarkers for more comprehensive and promising cell characterization.
Novel hardware-aided trusted execution environments, as provided by Intel's Software Guard Extensions (SGX), enable to execute applications in a secure context that enforces confidentiality and integrity of the ap...
详细信息
ISBN:
(纸本)9781538605424
Novel hardware-aided trusted execution environments, as provided by Intel's Software Guard Extensions (SGX), enable to execute applications in a secure context that enforces confidentiality and integrity of the application state even when the host system is misbehaving. While this paves the way towards secure and trustworthy cloud computing, essential system support to protect persistent application state against rollback and forking attacks is missing. In this paper we present LCM - a lightweight protocol to establish a collective memory amongst all clients of a remote application to detect integrity and consistency violations. LCM enables the detection of rollback attacks against the remote application, enforces the consistency notion of fork-linearizability and notifies clients about operation stability. The protocol exploits the trusted execution environment, complements it with simple client-side operations, and maintains only small, constant storage at the clients. This simplifies the solution compared to previous approaches, where the clients had to verify all operations initiated by other clients. We have implemented LCM and demonstrated its advantages with a key-value store application. The evaluation shows that it introduces low network and computation overhead;in particular, a LCM-protected key-value store achieves 0.72x - 0.98x of an SGX-secured key-value store throughput.
The proceedings contain 27 papers. The topics discussed include: a porting and optimization of search for neighbour particle in MPS method for GPU by using OpenACC;DTP: enabling exhaustive exploration of FPGA temporal...
ISBN:
(纸本)9781450353168
The proceedings contain 27 papers. The topics discussed include: a porting and optimization of search for neighbour particle in MPS method for GPU by using OpenACC;DTP: enabling exhaustive exploration of FPGA temporal partitions for streaming HPC applications;dataflow based near data computing achieves excellent energy efficiency;high speed performance estimation of embedded hard-core processors in FPGA-based SoCs;accelerated embedded AKAZE feature detection algorithm on FPGA;reducing the cost of removing border artefacts in Fourier transforms;an FPGA NIC based hardware caching for blockchain;towards flexible automatic generation of graph processing gateware;a time-division multiplexing Ising machine on FPGAs;performance evaluation of PEACH3: fieldprogrammable gate array switch for tightly coupled accelerators;hardware acceleration with multi-threading of Java-based high level synthesis tool;FPGA implementation of a graph cut algorithm for stereo vision;an adaptive demotion policy for high-associativity caches;a case for remote GPUs over 10GbE network for VR applications;acceleration of the aggregation process in a Hall thruster simulation using Intel FPGA SDK for OpenCL;and FPGA accelerated NoC-simulation - a case study on the intel Xeon Phi Ringbus topology.
暂无评论