|
|
|
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar...
ver más
|
|
|
|
|
|
|
Stavros Kalapothas, Manolis Galetakis, Georgios Flamis, Fotis Plessas and Paris Kitsos
In recent years, the advancements in specialized hardware architectures have supported the industry and the research community to address the computation power needed for more enhanced and compute intensive artificial intelligence (AI) algorithms and app...
ver más
|
|
|
|
|
|
|
Francesco Cosimi, Antonio Arena, Paolo Gai and Sergio Saponara
In this manuscript, we propose a configurable hardware device in order to build a coherent data log unit. We address the need for analyzing mixed-criticality systems, thus guaranteeing the best performances without introducing additional sources of inter...
ver más
|
|
|
|
|
|
|
Ján Mach, Luká? Kohútka and Pavel Cicák
The shrinking of technology nodes allows higher performance, but susceptibility to soft errors increases. The protection has been implemented mainly by lockstep or hardened process techniques, which results in a lower frequency, a larger area, and higher...
ver más
|
|
|
|
|
|
|
Marcello Barbirotta, Abdallah Cheikh, Antonio Mastrandrea, Francesco Menichelli, Marco Ottavi and Mauro Olivieri
Functional safety is a key requirement in several application domains in which microprocessors are an essential part. A number of redundancy techniques have been developed with the common purpose of protecting circuits against single event upset (SEU) fa...
ver más
|
|
|
|
|
|
|
Valentin Martinoli, Elouan Tourneur, Yannick Teglia and Régis Leveugle
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view of it...
ver más
|
|
|
|
|
|
|
Guillaume Devic, Gilles Sassatelli and Abdoulaye Gamatié
The execution of machine learning (ML) algorithms on resource-constrained embedded systems is very challenging in edge computing. To address this issue, ML accelerators are among the most efficient solutions. They are the result of aggressive architectur...
ver más
|
|
|
|
|
|
|
Sanjeev Shakya, Attaphongse Taparugssanagorn and Chaklam Silpasuwanchai
Gait analysis is a powerful technique that detects and identifies foot disorders and walking irregularities, including pronation, supination, and unstable foot movements. Early detection can help prevent injuries, correct walking posture, and avoid the n...
ver más
|
|
|
|
|
|
|
Peter Jamieson, Huan Le, Nathan Martin, Tyler McGrew, Yicheng Qian, Eric Schonauer, Alan Ehret and Michel A. Kinsy
With the growing popularity of RISC-V and various open-source released RISC-V processors, it is now possible for computer engineers students to explore this simple and relevant architecture, and also, these students can explore and design a microcontroll...
ver más
|
|
|
|
|
|
|
Pascal Pieper, Vladimir Herdt and Rolf Drechsler
RISC-V is a modern Instruction Set Architecture (ISA) that, by its open nature in combination with a clean and modular design, has enormous potential to become a game changer in the Internet of Things (IoT) era. Recently, SystemC-based Virtual Prototypes...
ver más
|
|
|
|