scholarly journals NBTI-aware data allocation strategies for scratchpad memory based embedded systems

Author(s):  
Cesare Ferri ◽  
Dimitra Papagiannopoulou ◽  
R. Iris Bahar ◽  
Andrea Calimera
2012 ◽  
Vol 28 (3) ◽  
pp. 349-363 ◽  
Author(s):  
Cesare Ferri ◽  
Dimitra Papagiannopoulou ◽  
R. Iris Bahar ◽  
Andrea Calimera

2015 ◽  
Vol 14 (2) ◽  
pp. 1-24 ◽  
Author(s):  
Zhiping Jia ◽  
Yang Li ◽  
Yi Wang ◽  
Meng Wang ◽  
Zili Shao

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 54701-54712
Author(s):  
Linbo Long ◽  
Qing Ai ◽  
Xiaotong Cui ◽  
Jun Liu

2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Author(s):  
VIRGINIE MARION-POTY ◽  
SERGE MIGUET

This paper discusses several data allocation strategies used for the parallel implementation of basic imaging operators. It shows that depending on the operator (sequential or parallel, with regular or irregular execution time), the image data must be partitioned in very different manners: The square sub-domains are best adapted for minimizing the communication volume, but rectangles can perform better when we take into account the time for constructing messages. Block allocations are well adapted for inherently parallel operators since they minimize interprocessor interactions, but in the case of recursive operators, they lead to nearly sequential executions. In this framework, we show the usefulness of block-cyclic allocations. Finally, we illustrate the fact that allocating the same amount of image data to each processor can lead to severe load imbalance in the case of some operators with data-dependant execution times.


2012 ◽  
Vol 60 (6) ◽  
pp. 3253-3263 ◽  
Author(s):  
Qingfeng Zhuge ◽  
Yibo Guo ◽  
Jingtong Hu ◽  
Wei-Che Tseng ◽  
Chun Jason Xue ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document