当前期刊: Journal of Systems Architecture Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • TOPSIS inspired Budget and Deadline Aware Multi-Workflow Scheduling for Cloud computing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-19
    Koneti Kalyan Chakravarthi; L. Shyamala

    Scheduling is a decision-making mechanism that allows resource sharing among several activities by determining their order of execution on the available resources. In the heterogeneous distributed systems, it is a great challenge to schedule concurrent workflows submitted by different users at different times. Scheduling with deadline and budget constraints are becoming an even more challenging issue

    更新日期:2020-10-19
  • HOSVD prototype based on modular SW libraries running on a high-performance CPU+GPU platform
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-19
    R.I. Acosta-Quiñonez; D. Torres-Roman; R. Rodriguez-Avila

    Efficient prototyping is an invaluable resource for modern enterprises and research centers. An efficient prototyping tool exhibits high throughput while maintaining flexibility, and reduces design and validation efforts, resulting in low time-to-market and high competitiveness. This paper presents a modular implementation of high-performance software (SW) libraries running on a Heterogeneous Computing

    更新日期:2020-10-19
  • Towards dynamic safety assurance for Industry 4.0
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-15
    Muhammad Atif Javed; Faiz Ul Muram; Hans Hansson; Sasikumar Punnekkat; Henrik Thane

    The goal of Industry 4.0 is to be faster, more efficient and more customer-centric, by enhancing the automation and digitalisation of production systems. Frequently, the production in Industry 4.0 is categorized as safety-critical, for example, due to the interactions between autonomous machines and hazardous substances that can result in human injury or death, damage to machines, property or the environment

    更新日期:2020-10-16
  • ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-14
    Jitao Wang; Guozi Sun; Yu Gu; Kun Liu

    At present, various types of code vulnerabilities lead to a huge workload of detection. Although multi-party cooperation detection methods can be applied to improve efficiency, common crowdsourcing models are difficult to guarantee the privacy of code and identity. We design a code and identity privacy vulnerability crowdsourcing detection system ConGradetect. The system is built on a blockchain and

    更新日期:2020-10-15
  • ArchNet: A data hiding design for distributed machine learning systems
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-14
    Kaiyan Chang; Wei Jiang; Jinyu Zhan; Zicheng Gong; Weijia Pan

    Integrating idle embedded devices into cloud computing is a promising approach to support Distributed Machine Learning (DML). In this paper, we approach to address the data hiding problem in such DML systems. For the purpose of the data encryption in DML systems, we introduce the tripartite asymmetric encryption theorem to provide theoretical support. Based on the theorem, we design a general image

    更新日期:2020-10-15
  • ADAPT: An Auxiliary Storage Data Path Toolkit
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-13
    Weisu Wang; Robert Roy; Sarah Diesburg; An-I Andy Wang

    The legacy storage data path is largely structured in black-box layers and has four major limitations: (1) functional redundancies across layers, (2) poor cross-layer coordination and data tracking, (3) presupposition of high-latency storage devices, and (4) poor support for new storage data models. While addressing all these limitations is a daunting challenge, we introduce ADAPT, an auxiliary storage

    更新日期:2020-10-13
  • A lightweight online backup manager for energy harvesting powered nonvolatile processor systems
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-10-10
    Weinning Song; Xiaojun Cai; Mengying Zhao; Zhaoyan Shen; Zhiping Jia

    With the explosive growth of battery-free and energy-harvesting devices, the energy harvesting powered system has gained more attentions and been widely used in different fields. However, unstable harvested energy is a challenge of energy-harvesting devices since the program execution would be interrupted frequently. Non-volatile processor (NVP) is proposed to back up volatile logics before energy

    更新日期:2020-10-11
  • Energy efficient backup overloading schemes for fault tolerant scheduling of real-time tasks
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-29
    Savina Bansal; Rakesh Kumar Bansal; Kiran Arora

    Efficient energy management and fault tolerance are two key issues that demand judicious handling while scheduling real-time task-sets. Standby-sparing technique is available in literature for fault tolerance, while dynamic power management (DPM) and dynamic voltage scaling (DVS) schemes are exploited for energy management. However, usage of auxiliary processor for running backup jobs leads to increased

    更新日期:2020-09-30
  • A Survey on Security and Authentication in Wireless Body Area Networks
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-28
    Bhawna Narwal; Amar Kumar Mohapatra

    Wireless Body Area Networks (WBAN) is often envisioned as a paradigm shift from the traditional healthcare system to the modern E-Healthcare system. The patient's vitals sensed by the sensors are highly sensitive, confidential, and susceptible to various attacks from adversaries. For the WBAN being a concrete application of the healthcare system, it is paramount to ensure that the data sensed by the

    更新日期:2020-09-29
  • Benchmarking vision kernels and neural network inference accelerators on embedded platforms
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-25
    Murad Qasaimeh; Kristof Denolf; Alireza Khodamoradi; Michaela Blott; Jack Lo; Lisa Halder; Kees Vissers; Joseph Zambreno; Phillip H. Jones

    Developing efficient embedded vision applications requires exploring various algorithmic optimization trade-offs and a broad spectrum of hardware architecture choices. This makes navigating the solution space and finding the design points with optimal performance trade-offs a challenge for developers. To help provide a fair baseline comparison, we conducted comprehensive benchmarks of accuracy, run-time

    更新日期:2020-09-25
  • Video action recognition with visual privacy protection based on compressed sensing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-19
    Jixin Liu; Ruxue Zhang; Guang Han; Ning Sun; Sam Kwong

    Action recognition in video involves interpreting complex semantic information, which remains a challenge in computer vision. Research on the use of deep neural networks for video action recognition has made significant progress in recent years, but most available recognition frameworks cannot satisfactorily perform the video action recognition task in privacy scene. In light of this issue, this paper

    更新日期:2020-09-20
  • Efficient Cache Resizing policy for DRAM-based LLCs in ChipMultiprocessors
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-17
    Bindu Agarwalla; Shirshendu Das; Nilkanta Sahu

    In today’s ChipMultiprocessors (CMPs), multiple cores share the common Last Level Cache (LLC), divided into multiple banks. As the data requirement is increasing the demand for larger LLC sizes is also increasing. The traditional SRAM technology is not area efficient to design such larger LLCs as demanded by the modern CMPs. From the last few years, DRAM technologies have been used to propose LLC.

    更新日期:2020-09-18
  • An efficient signcryption of heterogeneous systems for Internet of Vehicles
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-12
    Ahmed Elkhalil; Jiashu zhang; Rashad Elhabob; Nabeil Eltayieb

    The rapid development of the Internet of Vehicles (IoVs) leads to a significant increase in the number of automobiles connected to the Internet. Therefore, to make all vehicles under a shared Internet, we need distributed systems and efficient communication design known as the vehicles cloud. When IoV transmits the monitored data to the server, it can delete, modify, or eavesdrop. Thus, this can cause

    更新日期:2020-09-12
  • Palisade: A framework for anomaly detection in embedded systems
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-12
    Sean Kauffman; Murray Dunne; Giovani Gracioli; Waleed Khan; Nirmal Benann; Sebastian Fischmeister

    In this article, we propose Palisade, a distributed framework for streaming anomaly detection. Palisade is motivated by the need to apply multiple detection algorithms for distinct anomalies in the same scenario. Our solution blends low latency detection with deployment flexibility and ease-of-modification. This work includes a thorough description of the choices made in designing Palisade and the

    更新日期:2020-09-12
  • A genetic algorithm based energy efficient group paging approach for IoT over 5G
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-12
    Buddhadeb Pradhan; V. Vijayakumar; Sanjoy Pratihar; Deepak Kumar; K. Hemant Kumar Reddy; Diptendu Sinha Roy

    Cellular networks are evolving to the era of 5th Generation (5G), where 5G new radio (NR) and Long-Term Evolution: Advanced (LTE-A) Pro technologies are being envisioned for enabling smart and innovative services of the Internet-of-Things (IoT). However, existing LTE-A Pro protocols such as the group paging approach is still heavily inclined towards human-to-human communications owing to the heterogeneous

    更新日期:2020-09-12
  • Accelerating CNN Inference on ASICs: A survey
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-12
    Diksha Moolchandani; Anshul Kumar; Smruti R. Sarangi

    Convolutional neural networks (CNNs) have proven to be a disruptive technology in most vision, speech and image processing tasks. Given their ubiquitous acceptance, the research community is investing a lot of time and resources on deep neural networks. Custom hardware such as ASICs are proving to be extremely worthy platforms for running such programs. However, the ever-increasing complexity of these

    更新日期:2020-09-12
  • Blockchain-based batch authentication protocol for Internet of Vehicles
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-10
    Palak Bagga; Anil Kumar Sutrala; Ashok Kumar Das; Pandi Vijayakumar

    The vehicles in Internet of Vehicles (IoV) can be used to opportunistically gather and distribute the data in a smart city environment. However, at the same time, various security threats arise due to insecure communication happening among various entities in an IoV-based smart city deployment. To address this issue, we aim to design a novel blockchain-enabled batch authentication scheme in Artificial

    更新日期:2020-09-10
  • A comprehensive test framework for cryptographic accelerators in the cloud
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-09-10
    Hubin Zhang; Xiaokang Hu; Jian Li; Haibing Guan

    To alleviate the performance degradation introduced by cryptographic operations in web-based services, dedicated hardware accelerators have emerged for calculation offloading. However, accelerators from different vendors can be endowed with variable run-time modes and optimized for different workload types. It is necessary but challenging to fully and fairly quantify the associated acceleration benefits

    更新日期:2020-09-10
  • Federated scheduling for Typed DAG tasks scheduling analysis on heterogeneous multi-cores
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-26
    Meiling Han; Tianyu Zhang; Yuhan Lin; Qingxu Deng

    Heterogeneous multi-cores utilize the strength of different architectures for executing particular types of workload, and usually offer higher performance and energy efficiency. In this paper, we study a federated scheduling. Federated scheduling is a promising approach to schedule non-typed parallel real-time tasks, where each heavy task exclusively executes on a number of dedicated processors, while

    更新日期:2020-08-26
  • A survey on machine learning-based malware detection in executable files
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-22
    Jagsir Singh; Jaswinder Singh

    In last decade, a proliferation growth in the development of computer malware has been done. Nowadays, cybercriminals (attacker) use malware as a weapon to carry out the attacks on the computer systems. Internet is the main media to execute the malware attack on the computer systems through emails, malicious websites and by drive and download software. Malicious software can be a virus, trojan horse

    更新日期:2020-08-23
  • A survey of techniques for intermittent computing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-21
    Sumanth Umesh; Sparsh Mittal

    Intermittent computing (ImC) refers to the scenario where periods of program execution are separated by reboots. ImC systems are generally powered by energy-harvesting (EH) devices: they start executing a program when the accumulated energy reaches a threshold and stop when the energy buffer is exhausted. Since ImC does not depend on a fixed supply of power, it can be used in a wide range of scenarios/devices

    更新日期:2020-08-21
  • A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-20
    Xuanmei Qin; Yongfeng Huang; Zhen Yang; Xing Li

    Ciphertext-policy attribute-based encryption(CP-ABE) has been widely studied and used in access control schemes for secure data sharing. Since in most of the existing attribute-based encryption methods, all user attributes are managed by a single central authority, it is easy to cause a single point of failure. Therefore, several multi-authority CP-ABE schemes propose to manage user attributes by multiple

    更新日期:2020-08-20
  • Generalized and scalable offset-based response time analysis
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-17
    Deepak Vedha Raj Sudhakar; Karsten Albers; Frank Slomka

    Offset-based response time analysis techniques obtain tight worst-case response time (WCRT) bounds by accounting release time dependencies between tasks. The maximum response time variation of a task or a message (i.e., the difference between the worst-case and best-case response time) is used to compute the end-to-end delays of distributed systems (Palencia and Harbour, 1998), (Tindell and Clark,

    更新日期:2020-08-17
  • Identity Authentication Based on Trajectory Characteristics of Mobile Devices
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-14
    Zhigang Gao; Zhichao Cheng; Wenjie Diao; Jianhui Zhang; Huijuan Lu

    Users’ trip location information is of great value in the study of social computing and big data. Based on the personalized characteristics of user trajectory data, this paper proposes a Trajectory-based-based Identity Authentication Method (TIAM). TIAM consists of the registration phase and the authentication phase. Users initialize the trip routes and the coordinates of home and office in the registration

    更新日期:2020-08-14
  • Formal analysis of the continuous dynamics of cyber-physical systems using theorem proving
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-10
    Adnan Rashid; Osman Hasan

    Transform methods, such as the Laplace and the Fourier transforms, are widely used for analyzing the continuous dynamics of the physical components of Cyber-physical Systems (CPS). Traditionally, the transform methods based analysis of CPS is conducted using paper-and-pencil proof methods, computer-based simulations or computer algebra systems. However, all these methods cannot capture the continuous

    更新日期:2020-08-10
  • TARTS: A Temperature-Aware Real-Time Deadline-Partitioned Fair Scheduler
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-08
    Sanjay Moulik; Arnab Sarkar; Hemangee K. Kapoor

    Modern multicore systems, which perform complex functionalities on densely packed multi-million gate platforms at high frequencies, are often susceptible to inappropriate surges in core temperatures, if not effectively controlled. Increasing temperature above specified limits not only leads to high cost of cooling but also results in higher dissipation of leakage power together with a reduction in

    更新日期:2020-08-09
  • Comments on an identity-based signature scheme for VANETs
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-07
    Yaqing Song; Chunxiang Xu; Yuan Zhang; Fagen Li

    In this letter, we analyze the identity-based signature with conditional privacy-preserving authentication scheme (short for IBS-CPPA, published in Journal of Systems Architecture, doi: 10.1016/j.sysarc.2019.101692) and demonstrate that it cannot provide secure authentication between vehicles. Specifically, in IBS-CPPA, two types of adversaries can launch different attacks to forge a valid signature

    更新日期:2020-08-08
  • Task migration optimization for guaranteeing delay deadline with mobility consideration in mobile edge computing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-08-06
    Fan Tang; Chubo Liu; Kenli Li; Zhuo Tang; Keqin Li

    Mobile edge computing (MEC) is envisioned to integrate cloud-like capabilities into the edge of networks for improving quality of service (QoS). This makes it possible for users with resource-limited devices to execute computation-intensive tasks by offloading them to MEC nodes. Extensive works have been done for MEC. However, few of them involve user mobility. Whether to migrate task dynamically can’t

    更新日期:2020-08-06
  • Towards channel state information based coding to enhance security in satellite communication
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-25
    Rong geng; Ning Ye; Jun Liu; Dakai Zhu

    For satellite communication with bi-directional channels, we investigate the application of Low-Density Parity-Check (LDPC) coding by incorporating channel state information (CSI) to enhance its security performance. Specifically, the scheme includes two main steps: CSI measurement and the design of LDPC security coding. Based on its reciprocity and uniqueness, CSI is first obtained by estimating bidirectional

    更新日期:2020-07-25
  • Performance Optimization for Parallel Systems with Shared DWM via Retiming, Loop Scheduling, and Data Placement
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-23
    siyuan gao; Shouzhen Gu; Rui Xu; Edwin Hsing-Mean Sha; Qingfeng Zhuge

    Domain Wall Memory (DWM) as an ideal candidate for replacing traditional memories especially in parallel systems, has many desirable characteristics such as low leakage power, high density and low access latency. However, due to the tape-like architecture of DWM, shift operations have vital impact on performance. Considering data-intensive applications with massive loops and arrays, increasing parallelism

    更新日期:2020-07-23
  • Jellyfish Dynamic Routing Protocol with Mobile Sink for Location Privacy and Congestion Avoidance in Wireless Sensor Networks
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-23
    V. Bibin Christopher; J. Jasper

    Recently, Wireless Sensor Network (WSN) is often viewed with an oversized range of sensors that are structured and collaborate to gather and transmit information around the targets. As sensors may be positioned in harsh surroundings, it is critical for secure data transmission. Therefore, a dynamic routing path should be essential for WSN applications. In this paper, a Jellyfish Dynamic Routing Protocol

    更新日期:2020-07-23
  • A Survey on Hardware Accelerators and Optimization Techniques for RNNs
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-18
    Sparsh Mittal; Sumanth Umesh

    “Recurrent neural networks” (RNNs) are powerful artificial intelligence models that have shown remarkable effectiveness in several tasks such as music generation, speech recognition and machine translation. RNN computations involve both intra-timestep and inter-timestep dependencies. Due to these features, hardware acceleration of RNNs is more challenging than that of CNNs. Recently, several researchers

    更新日期:2020-07-20
  • How to Secure Autonomous Mobile Robots? An Approach with Fuzzing, Detection and Mitigation
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-18
    Chundong Wang; Yee Ching Tok; Rohini Poolat; Sudipta Chattopadhyay; Mohan Rajesh Elara

    Autonomous mobile robots share social spaces with humans, usually working together for domestic or professional tasks. Cyber security breaches in such robots undermine the trust between humans and robots. In this paper, we investigate how to apprehend and inflict security threats at the design and implementation stage of an autonomous mobile robot. To this end, we leverage the idea of directed fuzzing

    更新日期:2020-07-18
  • Cost and Makespan Scheduling of Workflows in Clouds Using List Multiobjective Optimization Technique
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-16
    Pengcheng Han; Chenglie Du; Jinchao Chen; Fuyuan Ling; Xiaoyan Du

    Highly scalable resource supply capacity of cloud computing has greatly improved the execution speed of workflow applications, however, traditional workflow scheduling algorithms which focus on the optimization of makespan (execution time) of workflows, become inappropriate for the design of large-scale workflow systems. Workflow scheduling in cloud computing is particularly a multiobjective optimization

    更新日期:2020-07-16
  • Domain-Specific Scenarios for Refinement-based Methods
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-12
    Colin Snook; Thai Son Hoang; Dana Dghaym; Asieh Salehi Fathabadi; Michael Butler

    Formal methods use abstraction and rigorously verified refinement to manage the design of complex systems, ensuring that they satisfy important invariant properties. However, formal verification is not sufficient: models must also be tested to ensure that they behave according to the informal requirements and validated by domain experts who may not be expert in formal modelling. This can be satisfied

    更新日期:2020-07-13
  • Exact response time analysis of fixed priority systems based on sporadic servers
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-07
    Jorge Martinez, Dakshina Dasari, Arne Hamann, Ignacio Sañudo, Marko Bertogna

    Real-time servers have been widely explored in the scheduling literature to predictably execute aperiodic activities, as well as to allow hierarchical scheduling settings. As they facilitate timing isolation between different software components, there is a renewed interest for the adoption of fixed priority real-time servers in the automotive domain, as a way to implement more efficient reservation

    更新日期:2020-07-07
  • MBBNet: An edge IoT computing-based traffic light detection solution for autonomous bus
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-07
    Zhenchao Ouyang, Jianwei Niu, Tao Ren, Yanqi Li, Jiahe Cui, Jiyan Wu

    Traffic light detection is a key module in the autonomous driving system to enhance the interactions between drivers and unmanned vehicles. In recent studies, deep neural networks are widely used for traffic light detection and resource/power consumption is a major concern for model deployment in vehicular edge devices. This paper proposes a novel light-weight deep CNN model that integrates the multi-backbone

    更新日期:2020-07-07
  • ESSA: An energy-Aware bit-Serial streaming deep convolutional neural network accelerator
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-03
    Lien-Chih Hsu, Ching-Te Chiu, Kuan-Ting Lin, Hsing-Huan Chou, Yen-Yu Pu

    Over the past decade, deep convolutional neural networks (CNN) have been widely embraced in various visual recognition applications owing to their extraordinary accuracy. However, their high computational complexity and excessive data storage present two challenges when designing CNN hardware. In this paper, we propose an energy-aware bit-serial streaming deep CNN accelerator to tackle these challenges

    更新日期:2020-07-03
  • ADHD fMRI short-time analysis method for edge computing based on multi-instance learning
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-03
    Chengfeng Dou, Shikun Zhang, Hanping Wang, Li Sun, Yu Huang, Weihua Yue

    Internet of things technology and edge computing have been applied increasingly in the field of medical treatment to solve the problem of imbalanced medical resources. To better diagnose Attention Deficit Hyperactivity Disorder (ADHD), we propose a new short-time diagnosis technology that can quickly analyze the functional magnetic resonance imaging (fMRI) of patients and assist doctors in remote diagnosis

    更新日期:2020-07-03
  • Efficient bypass in mesh and torus NoCs
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-07-02
    Iván Pérez, Enrique Vallejo, Ramón Beivide

    Minimizing latency and power are key goals in the design of NoC routers. Different proposals combine lookahead routing and router bypass to skip the arbitration and buffering, reducing router delay. However, the conditions to use them requires completely empty buffers in the intermediate routers. This restricts the amount of flits that use the bypass pipeline especially at medium and high loads, increasing

    更新日期:2020-07-02
  • A Survey on Deep Transfer Learning to Edge Computing for Mitigating the COVID-19 Pandemic
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-30
    Abu Sufian, Anirudha Ghosh, Ali Safaa Sadiq, Florentin Smarandache

    Global Health sometimes faces pandemics as are currently facing COVID-19 disease. The spreading and infection factors of this disease are very high. A huge number of people from most of the countries are infected within six months from its first report of appearance and it keeps spreading. The required systems are not ready up to some stages for any pandemic; therefore, mitigation with existing capacity

    更新日期:2020-06-30
  • IoT Device security through dynamic hardware isolation with cloud-Based update
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-29
    Festus Hategekimana, Taylor JL Whitaker, Md Jubaer Hossain Pantho, Christophe Bobda

    This work proposes a novel approach to provide comprehensive security to IoT devices. Our approach is based on a reconfigurable hardware-based isolation and protection mechanism (IPM) that operates as a dynamic separation unit between devices and network, far from potential software manipulation. The IPM analyses communications for malicious activities and prevents damage to the IoT device. The IPM

    更新日期:2020-06-29
  • Anomaly detection in bitcoin information networks with multi-constrained meta path
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-27
    Rui Zhang, Guifa Zhang, Lan Liu, Chen Wang, Shaohua Wan

    As the most popular digital currency, Bitcoin has a high economic value, and its security has been paid more and more attention. Anomaly detection of Bitcoin has become a problem that must be solved. The existing Bitcoin anomaly detection methods only use static network models, and only the simple structural features such as node attributes and in/out-degree are considered to measure the similarities

    更新日期:2020-06-27
  • OpenCL implementation of a SLAM system on an SoC-FPGA
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-25
    Salah Bouhoun, Rabah Sadoun, Mourad Adnane

    Simultaneous localization and mapping (SLAM) becomes a solved problem in terms of the algorithms. In order to use them in autonomous mobile robots, researches are focusing on reducing computation complexity and developing embedded systems with appropriate software and hardware architecture. In this work, we aim to perform a fully embedded implementation of a SLAM on an FPGA based SoC combining an embedded

    更新日期:2020-06-25
  • SSW: A strictly sequential writing method for open-channel SSD
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-25
    Yazhi Du, Jihua Gu, Zhongzhe Xiao, Min Huang

    While the NAND flash based solid state drive (SSD) has been widely adopted by both custom electronics and enterprise storages, the isolation of the file system and the information of the real status of the physical storage space will inevitably degrade the overall efficiency as well as the reliability of the storage and could become the bottleneck of the high-performance test systems. Open Channel

    更新日期:2020-06-25
  • Algorithm-based fault tolerance for discrete wavelet transform implemented on GPUs
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-24
    Chong Bao, Shancong Zhang

    An important application for discrete wavelet transform (DWT) is the image compression such as the JPEG2000 Standard, and GPU is a good choice for the implementation of the DWT. For the application of image compression in the space environment, this paper has discussed the fault tolerance for the forward DWT (FDWT) implemented on GPUs, to deal with the silent data corruption (SDC) errors caused by

    更新日期:2020-06-24
  • Perceptron based filtering of futile prefetches in embedded VLIW DSPs
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-24
    David Uzan, Roger Kahn, Shlomo Weiss

    Prefetching has been widely used in general purpose computers, especially in high performance CPUs, but has been much less used in DSPs and embedded processors. The goal of this paper is to investigate adding a perceptron, a single layer neural network [1], to straight-forward hardware prefetching techniques for embedded DSPs, and assess their performance improvement. By using industry standard benchmarks

    更新日期:2020-06-24
  • Latency upper bound for data chains of real-time periodic tasks
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-20
    Tomasz Kloda, Antoine Bertout, Yves Sorel

    The inter-task communication in embedded real-time systems can be achieved using various patterns and be subject to different timing constraints. One of the most basic communication patterns encountered in today’s automotive and aerospace software is the data chain. Each task of the chain reads data from the previous task and delivers the results of its computation to the next task. The data passing

    更新日期:2020-06-20
  • A Maude-Based rewriting approach to model and verify Cloud/Fog self-adaptation and orchestration
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-14
    Khaled Khebbeb, Nabil Hameurlain, Faiza Belala

    In the IoT-Fog-Cloud landscape, IoT devices are connected to numerous software applications in order to fully operate. Some applications are deployed on the Fog layer, providing low-latency access to resource, whilst others are deployed on the Cloud to provide important resource capabilities and process heavy computation. In this distributed landscape, the deployment infrastructure has to adapt to

    更新日期:2020-06-14
  • Bridging the gap between formal verification and schedulability analysis: The case of robotics
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-10
    Mohammed Foughali, Pierre-Emmanuel Hladik

    The challenges of deploying robots and autonomous vehicles call for further efforts to bridge the gap between the robotics, the real-time systems and the formal methods communities. Indeed, with robots being more and more involved in costly missions and contact with humans, a rigorous formal verification of their behavior in the presence of various real-time constraints is crucial. In order to increase

    更新日期:2020-06-10
  • A holistic cross-layer optimization approach for mitigating stragglers in in-memory data processing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-06
    Laiping Zhao, Yiming Li, Francoise Fogelman-Soulié, Keqiu Li

    In-memory data processing frameworks (e.g., Spark) make big data analysis greatly simpler and efficient. However, stragglers that take much longer to finish than other tasks significantly degrade performance. There exist multiple factors that cause stragglers, either from the hardware resource layer or application layer, e.g. hardware heterogeneity, interference, data locality and data skew. While

    更新日期:2020-06-06
  • Efficient SAT encoding scheme for schedulability analysis of non-preemptive tasks on multiple computational resources
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-06
    Jaishree Mayank, Arijit Mondal

    This work considers exact schedulability analysis of a set of aperiodic non-preemptive tasks on a given set of computational resources, and the problem is known to be NP-Complete. We propose four different SAT-based encoding schemes to address the exact schedulability problem. Each approach requires a different number of variables and generates a distinct number of clauses. We present extensive comparative

    更新日期:2020-06-06
  • Run-time adaptive data page mapping: A Comparison with 3D-stacked DRAM cache
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-06
    Rakesh Pandey, Aryabartta Sahu

    In the current chip-multiprocessor era, 3D-stacked DRAM became an attractive alternative to mitigate the DRAM bandwidth wall problem. In a chip-multiprocessor, the 3D-stacked DRAM is architect either (a) to cache both local and remote data or (b) to cache only the local data. Caching only local data into the 3D-stacked DRAM enforces the chip-multiprocessors to suffer inter-node latency overhead while

    更新日期:2020-06-06
  • PHDFS: Optimizing I/O performance of HDFS in deep learning cloud computing platform
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-04
    Zongwei Zhu, Luchao Tan, Yinzhen Li, Cheng Ji

    For deep learning cloud computing platforms, file system is a fundamental and critical component. Hadoop distributed file system (HDFS) is widely used in large scale clusters due to its high performance and high availability. However, in deep learning datasets, the number of files is huge but the file size is small, making HDFS suffer a severe performance penalty. Although there have been many optimizing

    更新日期:2020-06-04
  • A smart cyber physical multi-source energy system for an electric vehicle prototype
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-06-04
    Kambiz Tehrani

    This paper introduces a smart cyber physical multi-source energy system for electric vehicle applications. This system is realized in order to increase the autonomy of the vehicle as well as a good self-dispatch energy system. In this paper, three energy sources have modeled and integrated in the energy conversion chain of the vehicle. Moreover, the design of cyber energy dispatching system is proposed

    更新日期:2020-06-04
  • BZIP: A compact data memory system for UTXO-based blockchains
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-05-31
    Shuhao Jiang, Jiajun Li, Shijun Gong, Junchao Yan, Guihai Yan, Yi Sun, Xiaowei Li

    Unspent Transaction Output (UTXO) set is the foundational model used in many blockchain systems to represent assets. The benefits of UTXO representation include parallel processing, privacy, etc. However, the increasing size of UTXO set is degrading the access performance and severely brings down the validation speed of blockchain further, especially in resource-constrained scenerios, such as IoT.

    更新日期:2020-05-31
  • Efficient mapping of runnables to tasks for embedded AUTOSAR applications
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-05-30
    Fouad Khenfri, Khaled Chaaban, Maryline Chetto

    An AUTOSAR-based embedded software consists of a set of inter-connected Software Components (SWCs). Each SWC contains a set of runnables which are small code-fragments that should be mapped to Operating System (OS) tasks. This process of mapping runnables to tasks may affect both the system real-time schedulability and performance. This paper proposes fast and efficient algorithms for mapping runnables

    更新日期:2020-05-30
  • Makespan-minimization workflow scheduling for complex networks with social groups in edge computing
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-05-30
    Jin Sun, Lu Yin, Minhui Zou, Yi Zhang, Tianqi Zhang, Junlong Zhou

    Edge computing enables users to offload certain computation loads in complex applications to a nearby network consisting of multiple mobile devices such that the mobile devices’ resources can be integrated to afford these complex applications. Due to the social relationships among the owners of mobile devices, networks in edge computing are always complex and consist of multiple sub-networks intersecting

    更新日期:2020-05-30
  • Branch-aware data variable allocation for energy optimization of hybrid SRAM+NVM SPM☆
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-05-27
    Jinyu Zhan, Yixin Li, Wei Jiang, Jiayu Yu, Jinghuan Yu

    In this paper, we are interested in the energy optimization of hybrid Scratchpad Memory (SPM) which consists of SRAM and Non-Volatile Memory (NVM). We approach the energy optimization by data allocation with the consideration of the impact of program structure like branches. Our method is composed of two stages, i.e., program analysis stage and data allocation stage. In program analysis stage, we design

    更新日期:2020-05-27
  • A survey and taxonomy of congestion control mechanisms in wireless network on chip
    J. Syst. Archit. (IF 2.552) Pub Date : 2020-05-26
    Farhad Rad, Midia Reshadi, Ahmad Khademzadeh

    Wireless network on chip (WiNoC) has been proposed as a promising solution for on-chip interconnection network due to high scalability, high bandwidth, and low latency. However, the variations of traffic pattern distribution and data flow lead to congestion in wireless interfaces-equipped routers (WRs). Congestion is one of the main challenges in emerging WiNoCs that can reduce network performance

    更新日期:2020-05-26
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
3分钟学术视频演讲大赛
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
ACS Publications填问卷
阿拉丁试剂right
西北大学
大连理工大学
湖南大学
华东师范大学
王要兵
浙江大学
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
陆军军医大学
李霄鹏
廖矿标
试剂库存
down
wechat
bug