Searched for: department%3A%22Computer%255C%252BEngineering%22
(41 - 60 of 111)

Pages

document
Fieback, M. (author), Münch, Christopher (author), Gebregiorgis, A.B. (author), Cardoso Medeiros, G. (author), Taouil, M. (author), Hamdioui, S. (author), Tahoori, Mehdi (author)
Emerging non-volatile resistive memories like Spin-Transfer Torque Magnetic Random Access Memory (STT-MRAM) and Resistive RAM (RRAM) are in the focus of today’s research. They offer promising alternative computing architectures such as computation-in-memory (CiM) to reduce the transfer overhead between CPU and memory, usually referred to as the...
conference paper 2022
document
Köylü, T.C. (author), Hamdioui, S. (author), Taouil, M. (author)
Artificial neural networks (ANNs) are used to accomplish a variety of tasks, including safety critical ones. Hence, it is important to protect them against faults that can influence decisions during operation. In this paper, we propose smart and low-cost redundancy schemes that protect the most vulnerable ANN parts against fault attacks....
conference paper 2022
document
Wu, Lizhou (author), Rao, Siddharth (author), Taouil, M. (author), Marinissen, Erik Jan (author), Kar, Gouri Sankar (author), Hamdioui, S. (author)
The popularity of perpendicular magnetic tunnel junction (pMTJ)-based spin-transfer torque magnetic random access memories (STT-MRAMs) is growing very fast. The performance of such memories is very sensitive to magnetic fields, including both internal and external ones. This article presents a magnetic-field-aware compact model of pMTJ, named...
journal article 2022
document
Condia, Josie E.Rodriguez (author), Augusto da Silva, F. (author), Bagbaba, Ahmet Cagri (author), Guerrero-Balaguera, Juan-David (author), Hamdioui, S. (author), Sauer, Christian (author), Sonza Reorda, Matteo (author)
Editor's notes: GPUs have seen an increased adoption in autonomous systems. This article assesses the fault coverage that can be attained through software self-test strategies for in-field test of GPUs. - Nicola Nicolici, McMaster University
journal article 2022
document
Köylü, T.C. (author), Fieback, M. (author), Hamdioui, S. (author), Taouil, M. (author)
Fault injection attacks pose an important threat to security-sensitive applications, such as secure communication and storage. By injecting faults into instructions, an attacker can cause information leakage or denial-of-service. Hence, it is important to secure the sensitive parts not only by detecting faults in the executed instructions but...
conference paper 2022
document
Yousefzadeh, Amirreza (author), Stuijt, Jan (author), Hijdra, Martijn (author), Liu, Hsiao-Hsuan (author), Gebregiorgis, A.B. (author), Singh, A. (author), Hamdioui, S. (author), Catthoor, Francky (author)
Computation-in-Memory (CIM) is an emerging computing paradigm to address memory bottleneck challenges in computer architecture. A CIM unit cannot fully replace a general-purpose processor. Still, it significantly reduces the amount of data transfer between a traditional memory unit and the processor by enriching the transferred information....
journal article 2022
document
Zahedi, M.Z. (author), Abu Lebdeh, M.F.M. (author), Bengel, Christopher (author), Wouters, Dirk (author), Menzel, Stephan (author), Le Gallo, Manuel (author), Sebastian, Abu (author), Wong, J.S.S.M. (author), Hamdioui, S. (author)
In recent years, we are witnessing a trend toward in-memory computing for future generations of computers that differs from traditional von-Neumann architecture in which there is a clear distinction between computing and memory units. Considering that data movements between the central processing unit (CPU) and memory consume several orders...
journal article 2022
document
Shahroodi, Taha (author), Zahedi, M.Z. (author), Abhairaj Singh, A. (author), Wong, J.S.S.M. (author), Hamdioui, S. (author)
State-of-the-art taxonomic profilers that comprise the first step in larger-context metagenomic studies have proven to be computationally intensive, i.e., while accurate, they come at the cost of high latency and energy consumption. Table Lookup operation is a primary bottleneck of today's profilers. In this paper, we first propose TL-PIM, a...
conference paper 2022
document
Singh, A. (author), Bishnoi, R.K. (author), Joshi, Rajiv V. (author), Hamdioui, S. (author)
Resistive random access memory (RRAM) based computation-in-memory (CIM) architectures are attracting a lot of attention due to their potential in performing fast and energy-efficient computing. However, the RRAM variability and non-idealities limit the computing accuracy of such architectures, especially for multi-operand logic operations....
conference paper 2022
document
Bernardi, P. (author), Cantoro, R. (author), Coyette, A. (author), Dobbeleare, W. (author), Fieback, M. (author), Floridia, A. (author), Gielenk, G. (author), Guerriero, A. M. (author), Hamdioui, S. (author)
Electronics employed in modern safety-critical systems require severe qualification during the manufacturing process and in the field, to prevent fault effects from manifesting themselves as critical failures during mission operations. Traditional fault models are not sufficient anymore to guarantee the required quality levels for chips...
conference paper 2022
document
Mahmoud, A.N.N. (author), Vanderveken, Frederic (author), Adelmann, Christoph (author), Ciubotaru, Florin (author), Hamdioui, S. (author), Cotofana, S.D. (author)
By their very nature, spin waves (SWs) with different frequencies can propagate through the same waveguide, while mostly interfering with their own species. Therefore, more SW encoded data sets can coexist, propagate, and interact in parallel, which opens the road toward hardware replication-free parallel data processing. In this article, we...
journal article 2021
document
Aziza, Hassan (author), Hamdioui, S. (author), Fieback, M. (author), Taouil, M. (author), Moreau, Mathieu (author), Girard, Patrick (author), Virazel, Arnaud (author), Coulié, Karine (author)
RRAM density enhancement is essential not only to gain market share in the highly competitive emerging memory sector but also to enable future high-capacity and power-efficient brain-inspired systems, beyond the capabilities of today’s hardware. In this paper, a novel design scheme is proposed to realize reliable and uniform multi-level cell ...
journal article 2021
document
Yu, J. (author), Abu Lebdeh, M.F.M. (author), Du Nguyen, H.A. (author), Taouil, M. (author), Hamdioui, S. (author)
A novel type of hardware accelerators called automata processors (APs) have been proposed to accelerate finite-state automata. The bone structure of an AP is a hierarchical routing matrix that connects many memory arrays. With this structure, an AP can process an input symbol every clock cycle, and hence achieve much higher performance...
journal article 2021
document
Aljuffri, A.A.M. (author), Zwalua, Marc (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic devices. Several physical leakage sources can be exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels that is not frequently analyzed by attackers in the literature due to the high noise associated with...
journal article 2021
document
Mahmoud, A.N.N. (author), Vanderveken, Frederic (author), Adelmann, Christoph (author), Ciubotaru, Florin (author), Cotofana, S.D. (author), Hamdioui, S. (author)
The key enabling factor for Spin Wave (SW) technology utilization for building ultra low power circuits is the ability to energy efficiently cascade SW basic computation blocks. SW Majority gates, which constitute a universal gate set for this paradigm, operating on phase encoded data are not input output coherent in terms of SW amplitude....
journal article 2021
document
Copetti, Thiago (author), Cardoso Medeiros, G. (author), Taouil, M. (author), Hamdioui, S. (author), Poehls, Leticia Bolzani (author), Balen, Tiago (author)
Fin Field-Effect Transistor (FinFET) technology enables the continuous downscaling of Integrated Circuits (ICs), using the Complementary Metal-Oxide Semiconductor (CMOS) technology in accordance with the More Moore domain. Despite demonstrating improvements on short channel effect and overcoming the growing leakage problem of planar CMOS...
journal article 2021
document
Poehls, L. M.Bolzani (author), Fieback, M. (author), Hoffmann-Eifert, S. (author), Copetti, T. (author), Brum, E. (author), Menzel, S. (author), Hamdioui, S. (author), Gemmeke, T. (author)
Complementary Metal Oxide Semiconductor (CMOS) technology has been scaled down over the last forty years making possible the design of high-performance applications, following the predictions made by Gordon Moore and Robert H. Dennard in the 1970s. However, there is a growing concern that device scaling, while maintaining cost-effective...
journal article 2021
document
Cardoso Medeiros, G. (author), Fieback, M. (author), Wu, L. (author), Taouil, M. (author), Bolzani Poehls, L. M. (author), Hamdioui, S. (author)
Manufacturing defects can cause hard-to-detect (HTD) faults in fin field-effect transistor (FinFET) static random access memories (SRAMs). Detection of these faults, such as random read outputs and out-of-spec parametric deviations, is essential when testing FinFET SRAMs. Undetected HTD faults result in test escapes, which lead to early in-field...
journal article 2021
document
Taouil, M. (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Sepulveda, Johanna (author)
Dynamic Random Access Memory (DRAM)-based systems are widely used in mobile and portable applications where low-cost and high-storage memory capability are required. However, such systems are prone to attacks. A latent threat to DRAM-based system security is the so-called Rowhammer attacks. By repeatedly accessing memory, an attacker is able to...
conference paper 2021
document
Diware, S.S. (author), Gebregiorgis, A.B. (author), Joshi, Rajiv V. (author), Hamdioui, S. (author), Bishnoi, R.K. (author)
Emerging memristor-based computing has the potential to achieve higher computational efficiency over conventional architectures. Bit-slicing scheme, which represents a single neural weight using multiple memristive devices, is usually introduced in memristor-based neural networks to meet high bit-precision demands. However, the accuracy of such...
conference paper 2021
Searched for: department%3A%22Computer%255C%252BEngineering%22
(41 - 60 of 111)

Pages