Data-oblivious programs have gained popularity due to their application in security, but are often dismissed because of anticipated performance loss. In order to better understand these performance concerns, this pape...
详细信息
ISBN:
(纸本)9798350397390
Data-oblivious programs have gained popularity due to their application in security, but are often dismissed because of anticipated performance loss. In order to better understand these performance concerns, this paper details the first performance characterization of data-oblivious programs. We study mechanical data-oblivious transformations applied to twenty workloads from the VIP-Bench benchmark suite and find that, overall, performance overheads vary widely, with a geomean slowdown of 7.4x. This variance can be attributed to whether or not the data-oblivious transformations affect the workload's asymptotic complexity. Performance overheads are much lower for the fourteen workloads whose complexity is unaffected, at 1.9x geomean. Further, by reducing control hazards, we find that data-oblivious transformations often result in improved per-instruction performance (e.g., better branch and memory performance) and increase the number of instructions the processor can execute in parallel (e.g., IPC). Leveraging lessons from analyzing these overheads, we study four notably slow data-oblivious workloads and show how algorithmic changes can significantly improve performance-achieving an average 86.4x speedup over the mechanically produced baseline programs. While data-oblivious program execution often incurs overheads, the contributions of this paper show that these overheads can be overcome by compiler and algorithmic optimizations, bringing us closer to achieving efficient and widely-used data-oblivious programs.
A production-inventory control problem of a single-item make-to-stock system with non-identical production lines is studied. The item is demanded by customers arriving according to the Poisson process. Unmet demands o...
详细信息
This paper investigates the state-feedback and observer-based feedback control for positive cyber-physical systems. A novel positive anti-attack controller is first proposed for the systems by introducing a switched c...
详细信息
ISBN:
(数字)9798350380286
ISBN:
(纸本)9798350380293
This paper investigates the state-feedback and observer-based feedback control for positive cyber-physical systems. A novel positive anti-attack controller is first proposed for the systems by introducing a switched control strategy. By developing observer technique for cyber-physical systems, a positive controller equipped with dynamic output-feedback approach is refined to estimate unavailable output. Under the designed controllers, the positive and stable with $L_{1}$-gain performance are reached. Then, a matrix decomposition method is employed to design observer and controller gains. All presented conditions are described via linear programming. Finally, an illustrative example is given to verify the effectiveness of the proposed design.
The amount of robots in industry is increasing, pushing the need for easier configuration and integration of robots. The cost of robot integration is often larger than the cost of the robots themselves. With the incre...
详细信息
ISBN:
(纸本)9781665445405
The amount of robots in industry is increasing, pushing the need for easier configuration and integration of robots. The cost of robot integration is often larger than the cost of the robots themselves. With the increasing complexity of robotic systems and the tasks they perform, the future of reducing the expenses of robot system integration is significant. In this position paper, we report on some of the main challenges in robot system configuration, and give an overview of the current state-of-the-art of robot system configuration. We briefly look into the configuration of personal computers (PCs) and study how the robot system configuration can be improved inspired by the standards used in the PC area. We conclude with concrete proposals as to what can be done in the future, to make the process of robot system configuration and integration easier and cheaper.
This paper details a system for fast visual exploration and search without prior map information. We leverage frontier based planning with both LiDAR and visual sensing and augment it with a perception module that con...
详细信息
We discuss a novel investigation approach to study current limiting techniques for accurate memristor programming. In detail, referring to the case of the Stanford memristor model, we propose to analyze its programmin...
We discuss a novel investigation approach to study current limiting techniques for accurate memristor programming. In detail, referring to the case of the Stanford memristor model, we propose to analyze its programming dynamics adopting a nonlinear static analysis point of view and considering, for the sake of simplicity, the special case of a linear resistive current limiter.
Internet of Things (IoT) is a pivotal technology in application domains that require connectivity and interoperability between large numbers of devices. IoT systems predominantly use a software-defined network (SDN) a...
详细信息
ISBN:
(纸本)9781450393058
Internet of Things (IoT) is a pivotal technology in application domains that require connectivity and interoperability between large numbers of devices. IoT systems predominantly use a software-defined network (SDN) architecture as their core communication backbone. This architecture offers several advantages, including the flexibility to make IoT networks self-adaptive through software programmability. In general, self-adaptation solutions need to periodically monitor, reason about, and adapt a running system. The adaptation step involves generating an adaptation strategy and applying it to the running system whenever an anomaly arises. In this paper, we argue that, rather than generating individual adaptation strategies, the goal should be to adapt the logic / code of the running system in such a way that the system itself would learn how to steer clear of future anomalies, without triggering self-adaptation too frequently. We instantiate and empirically assess this idea in the context of IoT networks. Specifically, using genetic programming (GP), we propose a self-adaptation solution that continuously learns and updates the control constructs in the data-forwarding logic of SDN-based IoT networks. Our evaluation, performed using open-source synthetic and industrial data, indicates that, compared to a baseline adaptation technique that attempts to generate individual adaptations, our GP-based approach is more effective in resolving network congestion, and further, reduces the frequency of adaptation interventions over time. In addition, we compare our approach against a standard data-forwarding algorithm from the network literature, demonstrating that our approach significantly reduces packet loss.
In this paper, we investigate adaptive dynamic programming-based quintic polynomial trajectory planning and optimal tracking control for collaborative robotic systems. According to polynomial interpolation, a quintupl...
详细信息
ISBN:
(数字)9798350363173
ISBN:
(纸本)9798350363180
In this paper, we investigate adaptive dynamic programming-based quintic polynomial trajectory planning and optimal tracking control for collaborative robotic systems. According to polynomial interpolation, a quintuple polynomial trajectory planning method is proposed, which solves the problems of non-smooth angular velocity changes and jumps in acceleration with cubic polynomial interpolation. In addition, the optimal control strategy is solved by adaptive dynamic programming. Lyapunov functions are introduced to prove the stability of the control system. At last, the simulation results verify the truth of the above theory.
Multiparty session types (MPST) constitute a method to simplify construction and analysis of distributed systems. The idea is that well-typedness of processes at compile-time (statically) entails deadlock freedom and ...
详细信息
ISBN:
(纸本)9783031198489;9783031198496
Multiparty session types (MPST) constitute a method to simplify construction and analysis of distributed systems. The idea is that well-typedness of processes at compile-time (statically) entails deadlock freedom and protocol compliance of their sessions of communications at execution-time (dynamically). In practice, the premier approach to apply the MPST method in combination with mainstream programming languages has been based on API generation. However, existing MPST tools support only unilingual programming (homogeneity), while many real-world distributed systems are engineered using multilingual programming (heterogeneity). In this paper, we present a blueprint of ST4MP: a tool to apply the MPST method in multilingual programming, based on API generation.
The efficiency of elastic optical networks (EONs) can be improved if services are provisioned based on traffic patterns and dynamic reconfiguration of network resources, reducing network expenses by cutting down on wa...
详细信息
暂无评论