Smartphones are widely used nowadays and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptop...
详细信息
This note is a critical review of some aspects of the design case presented in Reflecting on the Design Process of the Affective Diary, Proceedings of NordiCHI2008. Copyright 2008 ACM.
ISBN:
(纸本)9781595937049
This note is a critical review of some aspects of the design case presented in Reflecting on the Design Process of the Affective Diary, Proceedings of NordiCHI2008. Copyright 2008 ACM.
The considerable gap between processor and DRAM speed and the power losses in the cache hierarchy calls for more efficient approaches. Broadly speaking, cache-hierarchy efficiency can be increased either by improving ...
详细信息
ISBN:
(纸本)9781605582436
The considerable gap between processor and DRAM speed and the power losses in the cache hierarchy calls for more efficient approaches. Broadly speaking, cache-hierarchy efficiency can be increased either by improving cache management or by reducing the number of load instructions that reach the cache hierarchy. We introduce the notion of zero loads to approach the latter. This paper explores the potential of tracking locations that contain the value 'zero'. Loads directed to such locations - termed Zero Loads - can be cancelled before they are issued in the cache hierarchy. We find that as many as 21% of the loads are Zero Loads and about one third of them are critical, i.e., ends up on the critical memory path for out-of-order cores. Motivated by this observation, we explore two innovative structures to capture Zero Loads by essentially book-keeping earlier visited blocks/locations that return 'zero'. These schemes are shown to be capable of improving performance and power/energy efficiency considerably. Copyright 2008 ACM.
Contemporary vehicles contain a number of electronic control units (ECUs), which are connected in a network and provide various vehicle functionalities. The firmware on the ECUs need to be kept up-to-date to provide b...
详细信息
ISBN:
(纸本)9780889867345
Contemporary vehicles contain a number of electronic control units (ECUs), which are connected in a network and provide various vehicle functionalities. The firmware on the ECUs need to be kept up-to-date to provide better and safer functionalities. An upcoming trend for automotive manufacturers is to create seamless interaction between the vehicle and fleet management to provide remote diagnostics and firmware updates over the air. To allow this, the previously isolated in-vehicle network must connect to an external network, and is thus exposed to a whole new range of threats, collectively known as cyber attacks. In this paper we have evaluated the ability of the current in-vehicle network to withstand cyber attacks by simulating a set of plausible attacks targeting the ECUs on the CAN bus. The results show that the network lacks sufficient protection against these attacks, and we therefore extensively discuss the future security needs for preventing, detecting, countering and recovering from such attacks.
We have analyzed a hypothetical scenario for hierarchical wireless vehicle networks consisting of a central portal and a large number of vehicles. Vehicles join the network, establish connections to the portal, transf...
详细信息
Modern intelligent vehicles have electronic control units containing firmware that enables various functions in the vehicle. New firmware versions are constantly developed to remove bugs and improve functionality. Aut...
详细信息
We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity. We suggest using a unidirectional auxiliary channel challenge-response scheme, where the ...
详细信息
In wireless personal area networks, establishing trust and authentication with previously unknown parties is both necessary and important. We propose an auxiliary channel Diffie-Hellman encrypted key-exchange authenti...
详细信息
A segmentation of drivers is presented, based on driving style, behaviours and attitudes. Four main segments are identified and described. The segmentation was complied using the Delphi method and is based on the synt...
详细信息
ISBN:
(纸本)9780415465755
A segmentation of drivers is presented, based on driving style, behaviours and attitudes. Four main segments are identified and described. The segmentation was complied using the Delphi method and is based on the synthesis of the views of a range of leading experts in the field. The segmentation is an essential first step in understanding drivers and creating solutions which will enhance driving behaviour.
The modifled-Booth algorithm is extensively used for high-speed multiplier circuits. Once, when array multipliers were used, the reduced number of generated partial products significantly improved multiplier performan...
详细信息
暂无评论