The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As integrated circuits are limited by hardware resources, reducing cost while maintaining the performance becomes especially important. In this article, we propose a conflict-free NoC (cfNoC) for the GPGPU request network. The cfNoC eliminates (i) conflicts among different columns by deploying an exclusive subnet for each column, and (ii) conflicts inside the same column by using a token-based mechanism...
Applications of advanced electronic technologies have greatly increased the efficiency and performance of safety-critical computer systems. In addition, the architectural flexibility of these systems reduces the types of printed circuit boards they can use, thereby reducing difficulties with maintenance. A newly developed safety-critical computer system is presented in this paper. The system uses...
The Reconfigurable Computing Cluster (RCC) project has been investigating unconventional architectures for high end computing using a cluster of FPGA devices connected by a high-speed, custom network. Most applications use the FPGAs to realize an embedded System-on-a-Chip (SoC) design augmented with application-specific accelerators to form a message-passing parallel computer. Other applications take...
Adopting expert hardware to physical isolate the trusted network from the non-trusted network can prevent all kinds of attack basing on network layer and operating system layer etc. This paper comes up with network isolation system model based on reflective architecture. The reflective GAP is hardware-based and its purpose is to rapidly mirror buffers between the non-trusted memory and the trusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.