Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The rapid development of the smartphones penetrated in every aspect of daily life starting from the health care, education, economics, social life etc. The prominence of the smartphones comes due to their size and connectivity, size made them the first handy personal computer available for 24\7 to the users. Unfortunately, the power of these smart devices and applications are limited and dependent...
Water heating is a leading cause of household energy consumption and, given its capacitive nature, has been the focus of research on demand side management and grid peak load management. Despite all the existing literature on energy for water heating, very little is known about an inextricably linked key determinant of it - demand for hot water and consumption patterns thereof. Moreover, even though...
Cloud datacenters are compute facilities formed by hundreds and thousands of heterogeneous servers requiring significant power requirements to operate effectively. Servers are composed by multiple interacting sub-systems including applications, microelectronic processors, and cooling which reflect their respective power profiles via different parameters. What is presently unknown is how to accurately...
With the development of image sensor technology, the AdaBoost-based face detections are widely used in many monitoring sensor networks and mobile-camera-based applications. Fast face detection with high detection accuracy and low power consumption in such kinds of applications is very important. Since the AdaBoost-based face detection exhibits characteristics of data computation in dual direction...
Massive MIMO has the potential to bring great spectral and energy efficiency improvements, making it a very promising technology for future wireless systems. Essential to achieve the gains in practice, is the ability to realize the many antenna paths at low complexity. In this paper, we consider the potential of processing at the semiconductor edge by allowing voltage over-scaling and complete antenna...
Heterogeneous MPSoCs consisting of cores with different performance/power behaviors are widely used in many power-constrained real-time systems. Both soft-error reliability and lifetime reliability are key concerns in such systems. Although existing work have investigated related problems, they either focus on one of the two reliability concerns or propose complicated scheduling algorithms that cannot...
The Phoenix1 project aims to develop a new approach to explore unknown environments, based on multiple measurement campaigns carried out by extremely tiny devices, called agents, that gather data through multiple sensors. These low power and low resource agents are configured specifically for each measurement campaign to achieve the exploration goal in the smallest number of iterations. Thus, the...
In this paper, we present a high speed yet energy efficient approximate divider where the division operation is performed by multiplying the dividend by the inverse of the divisor. In this structure, truncated value of the dividend is multiplied exactly (approximately) by the approximate inverse value of divisor. To assess the efficacy of the proposed divider, its design parameters are extracted and...
Making a computing system that mimic biological neural behavior in mammalian brain has attracted worldwide attention and endeavor. Neuromorphic computing systems, employing very-large-scale integration circuits to implement onto hardware, incorporates learning. Neural encoder, as one of the crucial component in neuromorphic computing systems, encodes the input information into spikes. By taking the...
Mobile and IoT applications must balance increasing processing demands with limited power and cost budgets. Approximate computing achieves this goal leveraging the error tolerance features common in many emerging applications to reduce power consumption. In particular, adequate (i.e., energy/quality-configurable) hardware operators are key components in an error tolerant system. Existing implementations...
Lightweight ciphers designed with a fully unrolled architecture, capable of encryption/decryption in a single clock cycle, have gained momentum in the last few years. They've shown that very low latency encryption/decryption is possible with modest costs in comparison with traditional round-based designs. This paper explores how to most efficiently perform side-channel analysis against such unrolled...
Energy efficient router is one of the most important and promising devices in the roadmap towards green communication and networking. In recent years, automatical power scaling adapting with real-time network traffic in a router has been proved to be practical on real hardware, which is an implementation under the traffic aware philosophy. In this paper, we further explore this direction, and present...
Heterogeneous and asymmetric computing systems are composed by a set of different processing units, each with its own unique performance and energy characteristics. Still, the majority of current network packet processing frameworks targets only a single device (the CPU or some accelerator), leaving other processing resources idle. In this paper, we propose an adaptive scheduling approach that supports...
We propose a technique that reduces static power consumption in caches with negligible hardware overhead and no performance penalties. Our proposed architecture achieves this by deterministically lowering the power state of cache lines that are guaranteed not to be accessed in the immediate future by exploiting in-flight cache access information. We simulated our architecture using the Simple scalar...
Floating point operations of addition, subtraction, multiplication and division for normalization require removing the leading zeros. Algorithms to remove the leading zeroes using NOR logic for input bits along with carry, XOR logic on result of floating point operation are proposed in literature. This paper proposes leading zero count algorithm using NAND logic for adjacent bits of result of floating...
The GPU has provide higher throughput by integrating more execution resources into a single chip without unduly compromising power efficiency. With the power wall challenge, however, increasing the throughput will require significant improvement in power efficiency. To accomplish this goal, we propose G-Scalar, a cost-effective generalized scalar execution architecture for GPUs in this paper. G-Scalar...
A new energy-proportional computing model extends Barroso and Hölzle's original definition for fixed-resource systems to aid in the design of more efficient modern systems with reconfigurable resources that can be varied at runtime.
Massive MIMO (MaMI) is often promoted as a technology that will enable the use of low-quality, cheap hardware. One particular component that has been in the focus of MaMI-related research is the analog-to-digital converter (ADC), and use of very low-resolution ADCs has been proposed. However, studies about whether this strategy is justified from an energy-efficiency point of view have largely been...
To save resources for Internet of Things (IoT) devices, a proposed approach segments operands and corresponding basic arithmetic operations that can be carried out by approximate function units for almost all applications. The approach also increases the security of IoT devices by hiding information for IP watermarking, digital fingerprinting, and lightweight encryption.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.