Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Nestan Tsiskaridze"'
Autor:
Kalhan Koul, Jackson Melchert, Kavya Sreedhar, Leonard Truong, Gedeon Nyengele, Keyi Zhang, Qiaoyi Liu, Jeff Setter, Po-Han Chen, Yuchen Mei, Maxwell Strange, Ross Daly, Caleb Donovick, Alex Carsello, Taeyoung Kong, Kathleen Feng, Dillon Huff, Ankita Nayak, Rajsekhar Setaluri, James Thomas, Nikhil Bhagdikar, David Durst, Zachary Myers, Nestan Tsiskaridze, Stephen Richardson, Rick Bahr, Kayvon Fatahalian, Pat Hanrahan, Clark Barrett, Mark Horowitz, Christopher Torng, Fredrik Kjolstad, Priyanka Raina
Publikováno v:
ACM Transactions on Embedded Computing Systems. 22:1-34
With the slowing of Moore’s law, computer architects have turned to domain-specific hardware specialization to continue improving the performance and efficiency of computing systems. However, specialization typically entails significant modificatio
Autor:
George Michelogiannakis, Advait Madhavan, Jennifer Volk, Timothy Sherwood, Georgios Tzimpragos, John Shalf, Nestan Tsiskaridze, Dilip Vasudevan
Publikováno v:
IEEE Micro. 41:71-79
Creating computing systems able to address our ever-increasing needs, especially as we reach the end of CMOS transistor scaling, will require truly novel methods of computing. However, the traditional logic abstractions and the digital design pattern
Autor:
Raj Setaluri, Kathleen Feng, Nestan Tsiskaridze, Taeyoung Kong, Jeff Setter, Aina Niemetz, Christopher Torng, Keyi Zhang, Teguh Hofstee, Ross Daly, Mark Horowitz, Maxwell Strange, Qiaoyi Liu, Ankita Nayak, Rick Bahr, Priyanka Raina, Caleb Donovick, David Durst, Stephen Richardson, Gedeon Nyengele, Fredrik Kjolstad, Kavya Sreedhar, Clark Barrett, Leonard Truong, Pat Hanrahan, Alex Carsello, James J. Thomas, Kayvon Fatahalian, Dillon Huff, Makai Mann, Nikhil Bhagdikar, Jackson Melchert
Publikováno v:
DAC
Although an agile approach is standard for software design, how to properly adapt this method to hardware is still an open question. This work addresses this question while building a system on chip (SoC) with specialized accelerators. Rather than us
Autor:
Georgios Tzimpragos, Dilip Vasudevan, Jennifer Volk, John Shalf, Timothy Sherwood, Advait Madhavan, George Michelogiannakis, Nestan Tsiskaridze
Publikováno v:
ASPLOS
Superconducting logic offers the potential to perform computation at tremendous speeds and energy savings. However, a "semantic gap" lies between the level-driven logic that traditional hardware designs accept as a foundation and the pulse-driven log
Autor:
Cesare Tinelli, Andrew Reynolds, Clark Barrett, Morgan Deters, Tianyi Liang, Nestan Tsiskaridze
Publikováno v:
Formal Methods in System Design. 48:206-234
An increasing number of applications in verification and security rely on or could benefit from automatic solvers that can check the satisfiability of constraints over a diverse set of data types that includes character strings. Until recently, satis
Publikováno v:
Automated Technology for Verification and Analysis ISBN: 9783030010898
ATVA
ATVA
Resource sharing while preserving privacy is an increasingly important problem due to a wide-scale adoption of cloud computing. Under multitenancy, it is common to have multiple mutually distrustful “processes” (e.g. cores, threads, etc.) running
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4e18006fee45e4a1917cb88ebe44101d
https://doi.org/10.1007/978-3-030-01090-4_24
https://doi.org/10.1007/978-3-030-01090-4_24
Publikováno v:
ESEC/SIGSOFT FSE
Symbolic program analysis techniques rely on satisfiability-checking constraint solvers, while quantitative program analysis techniques rely on model-counting constraint solvers. Hence, the efficiency of satisfiability checking and model counting is
Autor:
Wenchao Li, Wei Yang Tan, Adrià Gascón, Nestan Tsiskaridze, Pramod Subramanyan, Natarajan Shankar, Sanjit A. Seshia, Sharad Malik, Ashish Tiwari
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 2:63-80
Integrated circuits (ICs) are now designed and fabricated in a globalized multivendor environment making them vulnerable to malicious design changes, the insertion of hardware Trojans/malware, and intellectual property (IP) theft. Algorithmic reverse
Autor:
Andrew Reynolds, Clark Barrett, Morgan Deters, Nestan Tsiskaridze, Cesare Tinelli, Tianyi Liang
Publikováno v:
HotSoS
Motivation The security of software is increasingly more critical for consumer confidence, protection of privacy, protection of intellectual property, and even national security. As threats to software security have become more sophisticated, so too
Publikováno v:
Frontiers of Combining Systems ISBN: 9783319242453
FroCos
FroCos
We prove that the quantifier-free fragment of the theory of character strings with regular language membership constraints and linear integer constraints over string lengths is decidable. We do that by describing a sound, complete and terminating tab
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5a6231808e3c232b32890edbd0e1f135
https://doi.org/10.1007/978-3-319-24246-0_9
https://doi.org/10.1007/978-3-319-24246-0_9