Searched for: department%3A%22Computer%255C%252BEngineering%22
(1 - 20 of 111)

Pages

document
Augusto da Silva, F. (author), Bagbaba, Ahmet Cagri (author), Hamdioui, S. (author), Sauer, Christian (author)
This work aims at an alternative method to verify the correctness of Fault Lists generated by fault simulators tools in context of safety verification. The lists generated by simulation tools are verified against lists from formal tools. The consistency evaluation between the lists supports the Tool Confidence Level (TCL) assessment, defined in...
conference paper 2018
document
Yaldagard, Mohammad Amin (author), Diware, S.S. (author), Joshi, R.V. (author), Hamdioui, S. (author), Bishnoi, R.K. (author)
Resistive random access memory (RRAM) based computation-in-memory (CIM) architectures can meet the unprecedented energy efficiency requirements to execute AI algorithms directly on edge devices. However, the read-disturb problem associated with these architectures can lead to accumulated computational errors. To achieve the necessary level of...
conference paper 2023
document
Mahmoud, A.N.N. (author), Cucu Laurenciu, N. (author), Vanderveken, Frederic (author), Ciubotaru, Florin (author), Adelmann, Christoph (author), Cotofana, S.D. (author), Hamdioui, S. (author)
In the early stages of a novel technology development, it is difficult to provide a comprehensive assessment of its potential capabilities and impact. Nevertheless, some preliminary estimates can be drawn and are certainly of great interest and in this paper we follow this line of reasoning within the framework of the Spin Wave (SW) based...
conference paper 2022
document
Singh, A. (author), Zahedi, M.Z. (author), Shahroodi, T. (author), Gupta, Mohit (author), Gebregiorgis, A.B. (author), Komalan, Manu (author), Joshi, R.V. (author), Catthoor, Francky (author), Bishnoi, R.K. (author), Hamdioui, S. (author)
Spin-transfer torque magnetic random access memory (STT-MRAM) based computation-in-memory (CIM) architectures have shown great prospects for an energy-efficient computing. However, device variations and non-idealities narrow down the sensing margin that severely impacts the computing accuracy. In this work, we propose an adaptive referencing...
conference paper 2022
document
Taouil, M. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Sepulveda, Johanna (author)
Dynamic Random Access Memory (DRAM)-based systems are widely used in mobile and portable applications where low-cost and high-storage memory capability are required. However, such systems are prone to attacks. A latent threat to DRAM-based system security is the so-called Rowhammer attacks. By repeatedly accessing memory, an attacker is able to...
conference paper 2021
document
Gomony, Manil Dev (author), de Putter, Floran (author), Gebregiorgis, A.B. (author), Paulin, Gianna (author), Mei, Linyan (author), Jain, Vikram (author), Hamdioui, S. (author), Bishnoi, R.K. (author), Sanchez, Victor (author)
With the rise of deep learning (DL), our world braces for artificial intelligence (AI) in every edge device, creating an urgent need for edge-AI SoCs. This SoC hardware needs to support high throughput, reliable and secure AI processing at ultra-low power (ULP), with a very short time to market. With its strong legacy in edge solutions and open...
conference paper 2023
document
Shahroodi, Taha (author), Cardoso, Rafaela (author), Zahedi, M.Z. (author), Wong, J.S.S.M. (author), Bosio, Alberto (author), O'Connor, Ian (author), Hamdioui, S. (author)
This paper investigates the potential of a compute-in-memory core based on optical Phase Change Materials (oPCMs) to speed up and reduce the energy consumption of the Matrix-Matrix-Multiplication operation. The paper also proposes a new data mapping for Binary Neural Networks (BNNs) tailored for our oPCM core. The preliminary results show a...
conference paper 2023
document
Zahedi, M.Z. (author), Custers, Geert (author), Shahroodi, Taha (author), Gaydadjiev, G. (author), Wong, J.S.S.M. (author), Hamdioui, S. (author)
Performing analysis on large graph datasets in an energy-efficient manner has posed a significant challenge; not only due to excessive data movements and poor locality, but also due to the non-optimal use of high sparsity of such datasets. The latter leads to a waste of resources as the computation is also performed on zero's operands which do...
conference paper 2023
document
Yuan, S. (author), Taouil, M. (author), Fieback, M. (author), Xun, H. (author), Marinissen, Erik Jan (author), Kar, Gouri Sankar (author), Rao, Sidharth (author), Couet, Sebastien (author), Hamdioui, S. (author)
The development of Spin-transfer torque magnetic RAM (STT-MRAM) mass production requires high-quality dedicated test solutions, for which understanding and modeling of manufacturing defects of the magnetic tunnel junction (MTJ) is crucial. This paper introduces and characterizes a new defect called Back-Hopping (BH); it also provides its...
conference paper 2023
document
Xun, H. (author), Fieback, M. (author), Yuan, S. (author), Zhang, Ziwei (author), Taouil, M. (author), Hamdioui, S. (author)
Resistive Random Access Memory (RRAM) is a potential technology to replace conventional memories by providing low power consumption and high-density storage. As various manufacturing vendors make significant efforts to push it to high-volume production and commercialization, high-quality and efficient test solutions are of great importance. This...
conference paper 2023
document
Fieback, M. (author), Bradarić, Filip (author), Taouil, M. (author), Hamdioui, S. (author)
Resistive Random Access Memory (RRAM, or ReRAM) is a promising memory technology to replace Flash because of its low power consumption, high storage density, and simple integration in existing IC production processes. This has motivated many companies to invest in this technology. However, RRAM manufacturing introduces new failure mechanisms and...
conference paper 2023
document
Singh, A. (author), Bishnoi, R.K. (author), Kaichouhi, A. (author), Diware, S.S. (author), Joshi, R.V. (author), Hamdioui, S. (author)
Analog computation-in-memory (CIM) architecture alleviates massive data movement between the memory and the processor, thus promising great prospects to accelerate certain computational tasks in an energy-efficient manner. However, data converters involved in these architectures typically achieve the required computing accuracy at the expense...
conference paper 2023
document
Diware, S.S. (author), Gebregiorgis, A.B. (author), Joshi, R.V. (author), Hamdioui, S. (author), Bishnoi, R.K. (author)
Memristor-based computation-in-memory (CIM) can achieve high energy efficiency by processing the data within the memory, which makes it well-suited for applications like neural networks. However, memristors suffer from conductance variation problem where their programmed conductance values deviate from the desired values. Such variations lead...
conference paper 2023
document
Diware, S.S. (author), Gebregiorgis, A.B. (author), Joshi, Rajiv V. (author), Hamdioui, S. (author), Bishnoi, R.K. (author)
Emerging memristor-based computing has the potential to achieve higher computational efficiency over conventional architectures. Bit-slicing scheme, which represents a single neural weight using multiple memristive devices, is usually introduced in memristor-based neural networks to meet high bit-precision demands. However, the accuracy of such...
conference paper 2021
document
Mahmoud, A.N.N. (author), Vanderveken, Frederic (author), Adelmann, Christoph (author), Ciubotaru, Florin (author), Hamdioui, S. (author), Cotofana, S.D. (author)
By their very nature, voltage/current excited Spin Waves (SWs) propagate through waveguides without consuming noticeable power. If SW excitation is performed by the continuous application of voltages/currents to the input, which is usually the case, the overall energy consumption is determined by the transducer power and the circuit critical...
conference paper 2021
document
Cem Gursoy, Cemil (author), Kraak, D.H.P. (author), Ahmed, Foisal (author), Taouil, M. (author), Jenihhin, Maksim (author), Hamdioui, S. (author)
Memory designs require timing margins to compensate for aging and fabrication process variations. With technology downscaling, aging mechanisms became more apparent, and larger margins are considered necessary. This, in return, means a larger area requirement and lower performance for the memory. Bias Temperature Instability (BTI) is one of the...
conference paper 2022
document
Fieback, M. (author), Taouil, M. (author), Hamdioui, S. (author)
Testing of Computation-in-Memory (CIM) designs based on emerging non-volatile memory technologies, such as resistive RAM (RRAM), is fundamentally different from testing traditional memories. Such designs allow not only for data storage (i.e., memory configuration) but also for the execution of logical and arithmetic operations (i.e., computing...
conference paper 2022
document
Köylü, T.C. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Physical fault injection attacks are becoming an important threat to computer systems, as fault injection equipment becomes more and more accessible. In this work, we propose a new strategy to detect fault attacks in cryptosystems. We use a recurrent neural network (RNN) to detect problems in the program flow caused by injected faults. Our...
conference paper 2020
document
Wu, L. (author), Rao, Siddharth (author), Taouil, M. (author), Marinissen, Erik Jan (author), Kar, Gouri Sankar (author), Hamdioui, S. (author)
Understanding the manufacturing defects in magnetic tunnel junctions (MTJs), which are the data-storing elements in STT-MRAMs, and their resultant faulty behaviors are crucial for developing high-quality test solutions. This paper introduces a new type of MTJ defect: synthetic anti-ferromagnet flip (SAFF) defect, wherein the magnetization in...
conference paper 2021
document
Köylü, T.C. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Artificial neural networks are currently used for many tasks, including safety critical ones such as automated driving. Hence, it is very important to protect them against faults and fault attacks. In this work, we propose two fault injection attack detection mechanisms: one based on using output labels for a reference input, and the other on...
conference paper 2021
Searched for: department%3A%22Computer%255C%252BEngineering%22
(1 - 20 of 111)

Pages