Open Access. Powered by Scholars. Published by Universities.®
Computer and Systems Architecture Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (9)
- Hardware Systems (9)
- Digital Communications and Networking (6)
- VLSI and Circuits, Embedded and Hardware Systems (6)
- Electrical and Electronics (5)
-
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Other Computer Engineering (3)
- Programming Languages and Compilers (2)
- Artificial Intelligence and Robotics (1)
- Biomedical (1)
- Business (1)
- Data Science (1)
- Data Storage Systems (1)
- Digital Circuits (1)
- Electronic Devices and Semiconductor Manufacturing (1)
- Energy Systems (1)
- Industrial Engineering (1)
- Management Information Systems (1)
- Mechanical Engineering (1)
- Nanotechnology Fabrication (1)
- Numerical Analysis and Scientific Computing (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Electrical and Computer Engineering (1)
- Other Engineering (1)
- Risk Analysis (1)
- Signal Processing (1)
- Institution
- Keyword
-
- FPGA (3)
- Computer Networks (2)
- Deep learning (2)
- Embedded (2)
- Middleware (2)
-
- Neuromorphic (2)
- RISC-V (2)
- 1T1R (1)
- 6GL (1)
- Anomaly detection (1)
- Asynchronous Accumulative Updates (1)
- Audio Equalizer (1)
- Aurora (1)
- CGRA (1)
- Cache (1)
- Cholesky (1)
- Cloud computing infrastructure (1)
- Communication (1)
- Compiler (1)
- Computer Architecture (1)
- Containers (1)
- Convnets (1)
- Cyber crime (1)
- Cyber security (1)
- Cybersecurity (1)
- DMA (1)
- Data Movement (1)
- Data breach (1)
- Data science (1)
- Data-driven (1)
Articles 31 - 35 of 35
Full-Text Articles in Computer and Systems Architecture
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
Masters Theses
A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …
Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton
Programming Dense Linear Algebra Kernels On Vectorized Architectures, Jonathan Lawrence Peyton
Masters Theses
The high performance computing (HPC) community is obsessed over the general matrix-matrix multiply (GEMM) routine. This obsession is not without reason. Most, if not all, Level 3 Basic Linear Algebra Subroutines (BLAS) can be written in terms of GEMM, and many of the higher level linear algebra solvers' (i.e., LU, Cholesky) performance depend on GEMM's performance. Getting high performance on GEMM is highly architecture dependent, and so for each new architecture that comes out, GEMM has to be programmed and tested to achieve maximal performance. Also, with emergent computer architectures featuring more vector-based and multi to many-core processors, GEMM performance …
Power Management For Gpu-Cpu Heterogeneous Systems, Xue Li
Power Management For Gpu-Cpu Heterogeneous Systems, Xue Li
Masters Theses
In recent years, GPU-CPU heterogeneous architectures have been increasingly adopted in high performance computing, because of their capabilities of providing high computational throughput. However, current research focuses mainly on the performance aspects of GPU-CPU architectures, while improving the energy efficiency of such systems receives much less attention. There are few existing efforts that try to lower the energy consumption of GPU-CPU architectures, but they address either GPU or CPU in an isolated manner and thus cannot achieve maximized energy savings. In this paper, we propose GreenGPU, a holistic energy management framework for GPU-CPU heterogeneous architectures. Our solution features a two-tier …
Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop
Cyber Profiling For Insider Threat Detection, Akaninyene Walter Udoeyop
Masters Theses
Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based …
Performance Evaluation Of Memory And Computationally Bound Chemistry Applications On Streaming Gpgpus And Multi-Core X86 Cpus, Frederick E. Weber Iii
Performance Evaluation Of Memory And Computationally Bound Chemistry Applications On Streaming Gpgpus And Multi-Core X86 Cpus, Frederick E. Weber Iii
Masters Theses
In recent years, multi-core processors have come to dominate the field in desktop and high performance computing. Graphics processors traditionally used in CAD, video games, and other 3-d applications, have become more programmable and are now suitable for general purpose computing. This thesis explores multi-core processors and GPU performance and limitations in two computational chemistry applications: a memory bound component of ab-initio modeling and a computationally bound Monte Carlo simulation. For the applications presented in this thesis, exploiting multiple processors is done using a variety of tools and languages including OpenMP and MKL. Brook+ and the Compute Abstraction Layer streaming …