Agile hardware design is an approach to developing hardware systems that draws inspiration from the principles and practices of agile software development.It emphasizes collaboration,flexibility,iterative development,...
supported by the Natural Science Foundation of Beijing under Grant No.4192007;the National Natural Science Foundation of China under Grant No.61202076.
Hardware prefetching and replacement policies are two techniques to improve the performance of the memory subsystem.While prefetching hides memory latency and improves performance,interactions take place with the cach...
supported by the Key-Area Research and Development Program of Guangdong Province of China under Grant No.2018B010115002.
Speculative execution attacks can leak arbitrary program data under malicious speculation,presenting a severe security threat.Based on two key observations,this paper presents a software-transparent defense mechanism ...
It is our great pleasure to announce the publication of this special section in Journal of Computer Science and Technology(JCST),Memory-Centric System Research for High-Performance Computing(HPC).The growing disparity...
supported in part by the National Natural Science Foundation of China under Grant Nos.61876173,61432017,and 61532017.
Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth...
This work is supported by the National Key Research and Development Program of China under Grant No.2018YFB1004804;the National Natural Science Foundation of China under Grant No.61702492;the Shenzhen Basic Research Program under Grant Nos.JCYJ20170818153016513 and JCYJ20170307164747920,and Alibaba Innovative Research(AIR)Project.
Workload characterization is critical for resource management and scheduling.Recently,with the fast development of container technique,more and more cloud service providers like Google and Alibaba adopt containers to ...
The double fetch problem occurs when the data is maliciously changed between two kernel reads of the supposedly same data, which can cause serious security problems in the kernel. Previous research focused on the doub...
The cluster architecture has played an important role in high-end computing for the past 20 years. With the advent of Internet services, big data, and cloud computing, traditional clusters face three challenges: 1) ...
supported by the National Natural Science Foundation of China under Grant No.61170138;the Program for New Century Excellent Talents in University of China under Grant No.NCET-10-0728
We present a novel approach for real-time rendering Loop subdivision surfaces on modern graphics hardware. Our algorithm evaluates both positions and normals accurately, thus providing the true Loop subdivision surfac...
This paper introduces an improved evolvable and adaptive hardware oscillator design capable of supporting adaptation intended to restore control precision in damaged or imperfectly manufactured insect-scale flapping-w...