Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- rapid-communicationMarch 2022
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
AbstractA secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still ...
- research-articleAugust 2017
Efficient Bloom filter for network protocols using AES instruction set
IET Communications (CMU2), Volume 11, Issue 11Pages 1815–1821https://doi.org/10.1049/iet-com.2016.0641The Internet continues to flourish, while an increasing number of network applications are found deploying Bloom filters. However, the heterogeneity of the Bloom filter realisations complicates the utilisation of relevant applications. Moreover, when ...
- research-articleJanuary 2014
A bottom‐up approach to verifiable embedded system information flow security
IET Information Security (ISE2), Volume 8, Issue 1Pages 12–17https://doi.org/10.1049/iet-ifs.2012.0342With the wide deployment of embedded systems and constant increase in their inter‐connections, embedded systems tend to be confronted with attacks through security holes that are hard to predict using typical security measures such as access control or ...
- ArticleDecember 2000
Scylla: a smart virtual machine for mobile embedded systems
With the proliferation of wireless devices with embedded processors, there is an increasing desire to deploy applications that run transparently over the varied architectures of these devices. Virtual machines are one solution for code mobility, ...
- ArticleDecember 2000
Faster processing for microprocessor functional ATPG
In order to improve the quality of microprocessor tests, the use of instruction sets for testing is indispensable. This paper discusses how fault coverage can be improved with a short test pattern that repeatedly samples an R number of instructions as L ...
-
- ArticleSeptember 2000
The Long And Winding Road to High-Performance Image Processing with MMX/SSE
Recently introduced "SIMD on registers" extensions to commodity microprocessors instruction sets promise (according to the makers) high potential speed-ups for multimedia processing tasks. This paper introduces the complex programming model of MMX/SSE ...
- ArticleOctober 1997
Instruction prefetching using branch prediction information
Instruction prefetching can effectively reduce instruction cache misses, thus improving the performance. In this paper, we propose a prefetching scheme, which employs a branch predictor to run ahead of the execution unit and to prefetch potentially ...
- ArticleMarch 1997
ReCode: the design and re-design of the instruction codes for embedded instruction-set processors
This abstract presents a design aid called ReCode, and describes its use in the analysis of existing instruction-set processors. ReCode allows the exploration of the relationship between the instruction-set and the corresponding application code of ...
- ArticleFebruary 1997
The Pentium(R) processor with MMX/sup TM/ technology
Intel's MMX/sup TM/ technology is designed to accelerate multimedia and communications software. The Pentium(R) processor with MMX/sup TM/ technology (design code name P55C) is the first micro-processor to implement the new architecture, enabling the ...
- ArticleJanuary 1997
Media Processors
An overview of various media processors' architecture is presented in this short tutorial. The media processors discussed here provide compute powers in terms of billions of operations per second along with the memory bandwidth required to sustain those ...
- ArticleJune 1996
Adding instruction cache effect to schedulability analysis of preemptive real-time systems
RTAS '96: Proceedings of the 2nd IEEE Real-Time Technology and Applications Symposium (RTAS '96)Page 204Cache memories are commonly avoided in real time systems because of their unpredictable behavior. Recently, some research has been done to obtain tighter bounds on the worst case execution time (WCET) of cached programs. These techniques usually assume ...
- ArticleJune 1996
Efficient worst case timing analysis of data caching
RTAS '96: Proceedings of the 2nd IEEE Real-Time Technology and Applications Symposium (RTAS '96)Page 230Recent progress in worst case timing analysis of programs has made it possible to perform accurate timing analysis of pipelined execution and instruction caching. However there has not been much progress in worst case timing analysis of data caching. ...
- ArticleJune 1996
Scheduling of conditional branches using SSA form for superscalar/VLIW processors
ICPADS '96: Proceedings of the 1996 International Conference on Parallel and Distributed SystemsPage 344Global scheduling and optimization techniques are proposed to get more enough speedup for superscalar and VLIW (Very Long Instruction Word) processors. When we consider global scheduling and optimization, one of the most important issue is how to ...
- ArticleApril 1996
Architectural simulation system for M.f.a.s.t
The paper discusses the simulation system used to verify the architecture of the Mwave folded array signal transform (M.f.a.s.t.) processor, a single chip scalable very long instruction word (VLIW) processor array being developed by IBM ...
- ArticleMarch 1996
High performance branch prediction
Today's advanced architectures increasingly rely on accurate instruction fetch and branch prediction to maintain optimum pipeline performance. In this paper, dynamic branch prediction techniques are investigated and methods to increase branch prediction ...
- ArticleNovember 1995
A study of time redundant fault tolerance techniques for superscalar processors
As more and more transistors are incorporated into processor chips, the circuits are becoming more and more error-prone, necessitating the introduction of fault tolerance techniques. This paper investigates techniques to incorporate fault tolerance in ...
- ArticleOctober 1995
Control unit synthesis targeting low-power processors
With demands for reliability and further integration, reducing power consumption becomes a critical concern in today's processor design. Considering the different techniques to minimize power consumption and promote system's reliability, reducing ...
- ArticleSeptember 1995
Power analysis and low-power scheduling techniques for embedded DSP software
ISSS '95: Proceedings of the 8th international symposium on System synthesisPages 110–115https://doi.org/10.1145/224486.224525Abstract: This paper describes the application of a measurement based power analysis technique for an embedded DSP processor. An instruction-level power model for the processor has been developed using this technique. Significant points of difference ...
- ArticleSeptember 1995
Industrial experience using rule-driven retargetable code generation for multimedia applications
ISSS '95: Proceedings of the 8th international symposium on System synthesisPages 60–68https://doi.org/10.1145/224486.224499Abstract: The increasing usage of application-specific instruction set processors (ASIPs) in audio and video telecommunications has made strong demands on the rapid availability of dedicated compilers. A rule-driven approach to code generation may have ...
- ArticleSeptember 1995
Optimal code generation for embedded memory non-homogeneous register architectures
ISSS '95: Proceedings of the 8th international symposium on System synthesisPages 36–41https://doi.org/10.1145/224486.224493Abstract: This paper examines the problem of code generation for expression trees on non-homogeneous register set architectures. It proposes and proves the optimality of an O(n) algorithm for the tasks of instruction selection, register allocation and ...