


default search action
52nd DAC 2015: San Francisco, CA, USA
- Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7-11, 2015. ACM 2015, ISBN 978-1-4503-3520-1
- Moomen Chaari, Wolfgang Ecker, Cristiano Novello, Bogdan-Andrei Tabacaru, Thomas Kruse:
A model-based and simulation-assisted FMEDA approach for safety-relevant E/E systems. 1:1-1:6 - Kenji Nishimiya, Toru Saito, Satoshi Shimada:
Evaluation of functional mock-up interface for vehicle power network modeling. 2:1-2:6 - Armin Wasicek, Edward A. Lee, Hokeun Kim, Lev Greenberg, Akihito Iwai, Ilge Akkaya:
System simulation from operational data. 3:1-3:6 - Andrew B. Kahng:
New game, new goal posts: a recent history of timing closure. 4:1-4:6 - Carl Bowen:
Walking a thin line: performance and quality grading vs. yield overcut. 5:1-5:2 - Karthi Duraisamy, Ryan Gary Kim
, Wonje Choi, Guangshuo Liu, Partha Pratim Pande, Radu Marculescu
, Diana Marculescu
:
Energy efficient MapReduce with VFI-enabled multicore platforms. 6:1-6:6 - Hui Li
, Sébastien Le Beux, Yvain Thonnart
, Ian O'Connor
:
Complementary communication path for energy efficient on-chip optical interconnects. 7:1-7:6 - Jason Cong, Michael Gill, Yuchen Hao, Glenn Reinman, Bo Yuan:
On-chip interconnection network for accelerator-rich architectures. 8:1-8:6 - Hyunjun Jang, Jinchun Kim, Paul Gratz
, Ki Hwan Yum, Eun Jung Kim:
Bandwidth-efficient on-chip interconnect designs for GPGPUs. 9:1-9:6 - Jia Zhan, Jin Ouyang, Fen Ge, Jishen Zhao, Yuan Xie:
DimNoC: a dim silicon approach towards power-efficient on-chip network. 10:1-10:6 - Donald Kline Jr.
, Haifeng Xu, Rami G. Melhem, Alex K. Jones
:
Domain-wall memory buffer for low-energy NoCs. 11:1-11:6 - Wei Wen, Chi-Ruo Wu, Xiaofang Hu, Beiye Liu, Tsung-Yi Ho
, Xin Li, Yiran Chen:
An EDA framework for large scale hybrid neuromorphic computing systems. 12:1-12:6 - Boxun Li, Lixue Xia
, Peng Gu, Yu Wang
, Huazhong Yang:
Merging the interface: power, area and accuracy co-optimization for RRAM crossbar-based mixed-signal computing system. 13:1-13:6 - Chenchen Liu, Bonan Yan, Chaofei Yang, Linghao Song
, Zheng Li, Beiye Liu, Yiran Chen, Hai Li, Qing Wu, Hao Jiang:
A spiking neuromorphic design with resistive crossbar. 14:1-14:6 - Beiye Liu, Hai Li, Yiran Chen, Xin Li, Qing Wu, Tingwen Huang:
Vortex: variation-aware training for memristor X-bar. 15:1-15:6 - Feng Xie, Xiaoyao Liang, Qiang Xu
, Krishnendu Chakrabarty
, Naifeng Jing, Li Jiang:
Jump test for metallic CNTs in CNFET-based SRAM. 16:1-16:6 - Gai Liu, Zhiru Zhang
:
A reconfigurable analog substrate for highly efficient maximum flow computation. 17:1-17:6 - Sebastian Graf, Sebastian Reinhart, Michael Glaß
, Jürgen Teich, Daniel Platte:
Robust design of E/E architecture component platforms. 18:1-18:6 - Ying Wang, Yinhe Han, Cheng Wang, Huawei Li, Xiaowei Li
:
RADAR: a case for retention-aware DRAM assembly and repair in future FGR DRAM memory. 19:1-19:6 - Shouzhen Gu, Edwin Hsing-Mean Sha, Qingfeng Zhuge, Yiran Chen, Jingtong Hu
:
Area and performance co-optimization for domain wall memory in application-specific embedded systems. 20:1-20:6 - Rujia Wang, Lei Jiang, Youtao Zhang, Linzhang Wang, Jun Yang:
Selective restore: an energy efficient read disturbance mitigation scheme for future STT-MRAM. 21:1-21:6 - Andreas Tretter, Pratyush Kumar, Lothar Thiele:
Interleaved multi-bank scratchpad memories: a probabilistic description of access conflicts. 22:1-22:6 - Seyed Mohammad Seyedzadeh, Rakan Maddah, Alex K. Jones
, Rami G. Melhem:
PRES: pseudo-random encoding scheme to increase the bit flip reduction in the memory. 23:1-23:6 - Yohan Ko, Reiley Jeyapaul, Youngbin Kim
, Kyoungwoo Lee, Aviral Shrivastava
:
Guidelines to design parity protected write-back L1 data cache. 24:1-24:6 - Rickard Ewetz, Shankarshana Janarthanan, Cheng-Kok Koh:
Construction of reconfigurable clock trees for MCMM designs. 25:1-25:6 - Kwangsoo Han, Jiajia Li, Andrew B. Kahng, Siddhartha Nath, Jongpil Lee:
A global-local optimization framework for simultaneous multi-mode multi-corner clock skew variation reduction. 26:1-26:6 - Sheng-Yen Chen, Yao-Wen Chang
:
Routing-architecture-aware analytical placement for heterogeneous FPGAs. 27:1-27:6 - Xiaoqing Xu, Bei Yu, Jhih-Rong Gao, Che-Lun Hsu, David Z. Pan:
PARR: pin access planning and regular routing for self-aligned double patterning. 28:1-28:6 - Adrian Bock, Stephan Held, Nicolas Kämmerling, Ulrike Schorr:
Local search algorithms for timing-driven placement under arbitrary delay models. 29:1-29:6 - Wei-Ting Jonas Chan, Siddhartha Nath, Andrew B. Kahng, Yang Du, Kambiz Samadi:
3DIC benefit estimation and implementation guidance from 2DIC implementation. 30:1-30:6 - Yannan Liu, Jie Zhang, Lingxiao Wei, Feng Yuan, Qiang Xu
:
DERA: yet another differential fault attack on cryptographic devices based on error rate analysis. 31:1-31:6 - Younghyun Kim
, Woo Suk Lee, Vijay Raghunathan, Niraj K. Jha, Anand Raghunathan
:
Vibration-based secure side channel for medical devices. 32:1-32:6 - Giovanni Agosta
, Alessandro Barenghi
, Gerardo Pelosi
, Michele Scandale:
Information leakage chaff: feeding red herrings to side channel attackers. 33:1-33:6 - Ferdinand Brasser, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann, Patrick Koeberl:
TyTAN: tiny trust anchor for tiny devices. 34:1-34:6 - Man-Ki Yoon, Lui Sha, Sibin Mohan
, Jaesik Choi
:
Memory heat map: anomaly detection in real-time embedded systems using memory behavior. 35:1-35:6 - Ebrahim M. Songhori
, Siam U. Hussain, Ahmad-Reza Sadeghi, Farinaz Koushanfar
:
Compacting privacy-preserving k-nearest neighbor search using logic synthesis. 36:1-36:6 - Korosh Vatanparvar, Mohammad Abdullah Al Faruque
:
Battery lifetime-aware automotive climate control for electric vehicles. 37:1-37:6 - Philipp Mundhenk, Sebastian Steinhorst
, Martin Lukasiewycz, Suhaib A. Fahmy
, Samarjit Chakraborty
:
Security analysis of automotive architectures using probabilistic model checking. 38:1-38:6 - Shanker Shreejith
, Suhaib A. Fahmy
:
Security aware network controllers for next generation automotive embedded systems. 39:1-39:6 - Jaime Espinosa
, Carles Hernández
, Jaume Abella
, David de Andrés, Juan-Carlos Ruiz-Garcia
:
Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification. 40:1-40:6 - Daniel Thiele, Philip Axer, Rolf Ernst:
Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling. 41:1-41:6 - Sebastian Kehr, Eduardo Quiñones
, Bert Böddeker, Günter Schäfer:
Parallel execution of AUTOSAR legacy applications on multicore ECUs with timed implicit communication. 42:1-42:6 - Michael K. Papamichael, Peter A. Milder
, James C. Hoe:
Nautilus: fast automated IP design space search using guided genetic algorithms. 43:1-43:6 - Sascha Roloff, David Schafhauser, Frank Hannig
, Jürgen Teich:
Execution-driven parallel simulation of PGAS applications on heterogeneous tiled architectures. 44:1-44:6 - Junbin Wang, Leibo Liu
, Jianfeng Zhu, Shouyi Yin, Shaojun Wei:
Acceleration of control flows on reconfigurable architecture with a composite method. 45:1-45:6 - Munish Jassi, Daniel Müller-Gritschneder
, Ulf Schlichtmann
:
GRIP: grammar-based IP integration and packaging for acceleration-rich SoC designs. 46:1-46:6 - Ying Wang, Yinhe Han, Lei Zhang, Huawei Li, Xiaowei Li
:
ProPRAM: exploiting the transparent logic resources in non-volatile memory for near data computing. 47:1-47:6 - Harry D. Foster:
Trends in functional verification: a 2014 industry study. 48:1-48:6 - Vladimir Herdt, Hoang Minh Le, Rolf Drechsler
:
Verifying SystemC using stateful symbolic simulation. 49:1-49:6 - Tim Todman, Stephan Stilkerich, Wayne Luk:
In-circuit temporal monitors for runtime verification of reconfigurable designs. 50:1-50:6 - Yu-Yun Dai, Kei-Yong Khoo, Robert K. Brayton:
Sequential equivalence checking of clock-gated circuits. 51:1-51:6 - Maciej J. Ciesielski, Cunxi Yu, Walter Brown, Duo Liu, André Rossi
:
Verification of gate-level arithmetic circuits by function extraction. 52:1-52:6 - Keith A. Campbell, David Lin, Subhasish Mitra
, Deming Chen:
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles. 53:1-53:6 - Ahmad-Reza Sadeghi, Christian Wachsmann, Michael Waidner
:
Security and privacy challenges in industrial internet of things. 54:1-54:6 - Stephen McLaughlin:
Blocking unsafe behaviors in control systems through static and dynamic policy enforcement. 55:1-55:6 - Dirk Ziegenbein, Arne Hamann:
Timing-aware control software design for automotive systems. 56:1-56:6 - Shankara Narayanan Krishna, Ganesh Khandu Narwane, S. Ramesh, Ashutosh Trivedi
:
Compositional modeling and analysis of automotive feature product lines. 57:1-57:6 - Huafeng Yu, Prachi Joshi, Jean-Pierre Talpin, Sandeep K. Shukla, Shin'ichi Shiraishi:
The challenge of interoperability: model-based integration for automotive control software. 58:1-58:6 - John P. Hayes:
Introduction to stochastic computing and its challenges. 59:1-59:3 - Alexandru Paler, Simon J. Devitt
:
An introduction into fault-tolerant quantum computing. 60:1-60:6 - Ilia Polian, Austin G. Fowler:
Design automation challenges for scalable quantum architectures. 61:1-61:6 - David Kadjo, Raid Ayoub, Michael Kishinevsky, Paul V. Gratz
:
A control-theoretic approach for energy efficient CPU-GPU subsystem in mobile platforms. 62:1-62:6 - Hu Chen, Dieudonne Manzi, Sanghamitra Roy
, Koushik Chakraborty:
Opportunistic turbo execution in NTC: exploiting the paradigm shift in performance bottlenecks. 63:1-63:6 - Jinil Chung, Kenneth Ramclam, Jongsun Park
, Swaroop Ghosh:
Domain wall memory based digital signal processors for area and energy-efficiency. 64:1-64:6 - Xiang Chen, Yiran Chen, Chun Jason Xue:
DaTuM: dynamic tone mapping technique for OLED display power saving based on video classification. 65:1-65:6 - Xiaoxiao Liu
, Mengjie Mao, Beiye Liu, Hai Li
, Yiran Chen, Boxun Li, Yu Wang
, Hao Jiang, Mark Barnell, Qing Wu, Jianhua Joshua Yang
:
RENO: a high-efficient reconfigurable neuromorphic computing accelerator design. 66:1-66:6 - Swagath Venkataramani, Anand Raghunathan
, Jie Liu, Mohammed Shoaib:
Scalable-effort classifiers for energy-efficient machine learning. 67:1-67:6 - Kwangsoo Han, Andrew B. Kahng, Hyein Lee:
Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router. 68:1-68:6 - Yixiao Ding, Chris C. N. Chu, Wai-Kei Mak:
Detailed routing for spacer-is-metal type self-aligned double/quadruple patterning lithography. 69:1-69:6 - Yasmine Badr, Andres Torres, Puneet Gupta
:
Mask assignment and synthesis of DSA-MP hybrid lithography for sub-7nm contacts/vias. 70:1-70:6 - Yibo Lin
, Bei Yu, David Z. Pan:
High performance dummy fill insertion with coupling and uniformity constraints. 71:1-71:6 - Yixiao Ding, Chris C. N. Chu, Xin Zhou:
An efficient shift invariant rasterization algorithm for all-angle mask patterns in ILT. 72:1-72:6 - Abde Ali Kagalwalla, Puneet Gupta
:
Effective model-based mask fracturing for mask cost reduction. 73:1-73:6 - Lucas Davi, Matthias Hanreich, Debayan Paul, Ahmad-Reza Sadeghi, Patrick Koeberl, Dean Sullivan, Orlando Arias, Yier Jin
:
HAFIX: hardware-assisted flow integrity extension. 74:1-74:6 - Garrett S. Rose
, Chauncey A. Meade:
Performance analysis of a memristive crossbar PUF design. 75:1-75:6 - Teng Xu, Dongfang Li, Miodrag Potkonjak:
Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models. 76:1-76:6 - Jae-Won Jang, Jongsun Park
, Swaroop Ghosh, Swarup Bhunia
:
Self-correcting STTRAM under magnetic field attacks. 77:1-77:6 - Edward Tashjian, Azadeh Davoodi:
On using control signals for word-level identification in a gate-level netlist. 78:1-78:6 - Jinyong Lee, Ingoo Heo, Yongje Lee, Yunheung Paek:
Efficient dynamic information flow tracking on a processor with core debug interface. 79:1-79:6 - Marilyn Wolf, Eric Feron:
What don't we know about CPS architectures? 80:1-80:4 - Janos Sztipanovits, Ted Bapty, Sandeep Neema
, Xenofon D. Koutsoukos, Ethan K. Jackson:
Design tool chain for cyber-physical systems: lessons learned. 81:1-81:6 - Bharathan Balaji, Mohammad Abdullah Al Faruque
, Nikil D. Dutt
, Rajesh K. Gupta, Yuvraj Agarwal:
Models, abstractions, and architectures: the missing links in cyber-physical systems. 82:1-82:6 - Mengjie Mao, Jingtong Hu
, Yiran Chen, Hai Li
:
VWS: a versatile warp scheduler for exploring diverse cache localities of GPGPU applications. 83:1-83:6 - Nasibeh Teimouri, Hamed Tabkhi, Gunar Schirner
:
Revisiting accelerator-rich CMPs: challenges and solutions. 84:1-84:6 - Haseeb Bokhari, Haris Javaid, Muhammad Shafique
, Jörg Henkel, Sri Parameswaran
:
SuperNet: multimode interconnect architecture for manycore chips. 85:1-85:6 - Muhammad Shafique
, Waqas Ahmad, Rehan Hafiz
, Jörg Henkel:
A low latency generic accuracy configurable adder. 86:1-86:6 - Guangli Jiang, Leibo Liu
, Wenping Zhu, Shouyi Yin, Shaojun Wei:
A 127 fps in full hd accelerator based on optimized AKAZE with efficiency and effectiveness for image feature extraction. 87:1-87:6 - Rujia Wang, Lei Jiang, Youtao Zhang, Linzhang Wang, Jun Yang:
Exploit imbalanced cell writes to mitigate write disturbance in dense phase change memory. 88:1-88:6 - Hyungmin Cho, Chen-Yong Cher, Thomas Shepherd, Subhasish Mitra
:
Understanding soft errors in uncore components. 89:1-89:6 - Hai-Bao Chen, Sheldon X.-D. Tan, Valeriy Sukharev
, Xin Huang, Taeyoung Kim
:
Interconnect reliability modeling and analysis for multi-branch interconnect trees. 90:1-90:6 - Yarui Peng
, Bon Woong Ku, Youn-Sik Park, Kwang-Il Park, Seong-Jin Jang, Joo-Sun Choi, Sung Kyu Lim
:
Design, packaging, and architectural policy co-optimization for DC power integrity in 3D DRAM. 91:1-91:6 - Shreepad Panth, Kambiz Samadi, Yang Du, Sung Kyu Lim
:
Tier-partitioning for power delivery vs cooling tradeoff in 3D VLSI for mobile applications. 92:1-92:6 - Ye Wang, Meng Li, Xinyang Yi, Zhao Song, Michael Orshansky, Constantine Caramanis
:
Novel power grid reduction method based on L1 regularization. 93:1-93:6 - Xiaochen Liu, Shupeng Sun, Pingqiang Zhou, Xin Li, Haifeng Qian
:
A statistical methodology for noise sensor placement and full-chip voltage map generation. 94:1-94:6 - Beiye Liu, Chunpeng Wu, Hai Li
, Yiran Chen, Qing Wu, Mark Barnell, Qinru Qiu:
Cloning your mind: security challenges in cognitive system designs and their solutions. 95:1-95:5 - Bowen Zheng, Wenchao Li, Peng Deng, Léonard Gérard, Qi Zhu
, Natarajan Shankar:
Design and verification for transportation system security. 96:1-96:6 - Yang Liu, Shiyan Hu, Jie Wu, Yiyu Shi, Yier Jin
, Yu Hu, Xiaowei Li
:
Impact assessment of net metering on smart home cyberattack detection. 97:1-97:6 - Adam D. Sherer, John Rose, Riccardo Oddone:
Ensuring functional safety compliance for ISO 26262. 98:1-98:3 - Bernhard Schätz, Sebastian Voss, Sergey Zverlov:
Automating design-space exploration: optimal deployment of automotive SW-components in an ISO26262 context. 99:1-99:6 - Hsiang-Jen Tsai, Keng-Hao Yang, Yin-Chi Peng, Chien-Chen Lin, Ya-Han Tsao, Meng-Fan Chang, Tien-Fu Chen:
Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI. 100:1-100:6 - Muhammad Shafique
, Muhammad Usman Karim Khan, Adnan Orcun Tüfek, Jörg Henkel:
EnAAM: energy-efficient anti-aging for on-chip video memories. 101:1-101:6 - Shrikanth Ganapathy, Georgios Karakonstantis, Adam Teman
, Andreas Burg
:
Mitigating the impact of faults in unreliable memories for error-resilient applications. 102:1-102:6 - Gushu Li, Xiaoming Chen, Guangyu Sun, Henry Hoffmann, Yongpan Liu, Yu Wang
, Huazhong Yang:
A STT-RAM-based low-power hybrid register file for GPGPUs. 103:1-103:6 - Chaofan Li, Wei Luo, Sachin S. Sapatnekar
, Jiang Hu:
Joint precision optimization and high level synthesis for approximate computing. 104:1-104:6 - Georgios Tziantzioulis, Ali Murat Gok, S. M. Faisal, Nikolaos Hardavellas
, Seda Ogrenci Memik, Srinivasan Parthasarathy
:
b-HiVE: a bit-level history-based error model with value correlation for voltage-scaled integer and floating point units. 105:1-105:6 - YoungHoon Jung, Luca P. Carloni
:
ΣVP: host-GPU multiplexing for efficient simulation of multiple embedded GPUs on virtual platforms. 106:1-106:6 - Jaeyoung Yun
, Jinsu Park, Woongki Baek:
HARS: a heterogeneity-aware runtime system for self-adaptive multithreaded applications. 107:1-107:6 - Lukas Cavigelli
, Michele Magno
, Luca Benini
:
Accelerating real-time embedded scene labeling with convolutional networks. 108:1-108:6 - Santanu Sarma, Tiago Mück, Luis Angel D. Bathen, Nikil D. Dutt
, Alexandru Nicolau:
SmartBalance: a sensing-driven linux load balancer for energy efficiency of heterogeneous MPSoCs. 109:1-109:6 - Hongsik Lee, Dong Nguyen, Jongeun Lee:
Optimizing stream program performance on CGRA-based systems. 110:1-110:6 - Boyou Zhou
, Ronen Adato, Mahmoud Zangeneh, Tianyu Yang, Aydan Uyar, Bennett B. Goldberg, M. Selim Ünlü, Ajay Joshi:
Detecting hardware trojans using backside optical imaging of embedded watermarks. 111:1-111:6 - Jeyavijayan Rajendran, Vivekananda Vedula, Ramesh Karri
:
Detecting malicious modifications of data in third-party intellectual property cores. 112:1-112:6 - Carson Dunbar, Gang Qu:
A practical circuit fingerprinting method utilizing observability don't care conditions. 113:1-113:6 - Zimu Guo, Mark M. Tehranipoor, Domenic Forte
, Jia Di:
Investigation of obfuscation-based anti-reverse engineering for printed circuit boards. 114:1-114:6 - Weize Yu, Orhun Aras Uzun, Selçuk Köse
:
Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks. 115:1-115:6 - Vladimir Rozic, Bohan Yang, Wim Dehaene, Ingrid Verbauwhede
:
Highly efficient entropy extraction for true random number generators on FPGAs. 116:1-116:6 - Veit B. Kleeberger
, Stefan Rutkowski, Ruth Coppens:
Design & verification of automotive SoC firmware. 117:1-117:6 - Alexandre Petrenko
, Omer Nguena-Timo
, S. Ramesh:
Model-based testing of automotive software: some challenges and solutions. 118:1-118:6 - Jörg Henkel, Heba Khdr
, Santiago Pagani, Muhammad Shafique
:
New trends in dark silicon. 119:1-119:6 - Swagath Venkataramani, Srimat T. Chakradhar, Kaushik Roy,