Works (36)

Updated: March 29th, 2024 05:02

2023 article

CryptoMMU: Enabling Scalable and Secure Access Control of Third-Party Accelerators

56TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, MICRO 2023, pp. 32–48.

By: F. Alam n, H. Lee n, A. Bhattacharjee* & A. Awad n

author keywords: IOMMU; accelerator-rich architecture; access control; cryptography
TL;DR: This paper proposes a novel scheme, CryptoMMU, to delegate the translation processes to accelerators, whereas the authentication of the targeted address is elegantly performed using a cryptography-based approach, providing better scalability. (via Semantic Scholar)
Source: Web Of Science
Added: March 25, 2024

2023 article

D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives

2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 908–921.

TL;DR: D-Shield is presented, a processor-side secure framework to holistically protect NVMe storage data confidentiality and integrity with low overheads that integrates a novel DMA Interception Engine that allows the processor to perform security metadata maintenance and data protection without any modification to the NVMe protocol and NVMe disks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: June 5, 2023

2023 article

ERAS: A Flexible and Scalable Framework for Seamless Integration of RTL Models with Structural Simulation Toolkit

2023 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION, IISWC, pp. 196–200.

By: S. Nema n, S. Chunduru n, C. Kodigal n, G. Voskuilen*, A. Rodrigues*, S. Hemmert*, B. Feinberg*, H. Lee n, A. Awad n, C. Hughes*

author keywords: RTL; architectural simulator; SST; gem5
TL;DR: This work proposes a framework, ERAS, that enables seamless integration of RTL IP models with high-level architectural simulators, such as Structural Simulation Toolkit (SST), and leverages SST’s multi-thread support to enhance simulation speed, effectively overcoming a key bottleneck of detailed RTL simulation. (via Semantic Scholar)
Source: Web Of Science
Added: January 2, 2024

2023 journal article

HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 22(4).

author keywords: Integrity; merkle tree; dataflow; FPGA
TL;DR: The goal for this work is to introduce HMT, a hardware-friendly BMT algorithm that enables the verification and update processes to function independently and provides the benefits of relaxed update while being comparable to the eager update in terms of update complexity. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2023 article

Plutus: Bandwidth-Efficient Memory Security for GPUs

2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 543–555.

By: R. Abdullah n, H. Zhou n & A. Awad n

TL;DR: This work proposes a novel design, Plutus, which enables low-overhead secure GPU memory and uses smaller block sizes for security metadata caches to optimize the number of security metadata memory requests. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: June 5, 2023

2023 article

SS-AXI: Secure and Safe Access Control Mechanism for Multi-Tenant Cloud FPGAs

2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS.

By: E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Multi-tenant cloud FPGAs; access control mechanism; memory isolation
TL;DR: This paper proposes an improved access control mechanism for multi-tenant cloud FPGAs that allows dynamic configuration of access control privileges and has three advantages: enabling secure resource sharing of on-chip BRAMs to tenants, enabling safe sharing by resolving deadlocks and faulty access requests, and improvement in latency and throughput. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2023 article

Thoth: Bridging the Gap Between Persistently Secure Memories and Memory Interfaces of Emerging NVMs

2023 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA, pp. 94–107.

By: X. Han n, J. Tuck n & A. Awad n

author keywords: Persistent Memory; Security Metadata; Secure NVM
TL;DR: A novel solution is proposed, Thoth, which leverages a novel off-chip persistent partial updates combine buffer that can ensure crash consistency at the cost of a fraction of the write amplification by the state-of-the-art solutions when adapted to future interfaces. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: June 5, 2023

2022 article

A Keylogging Inference Attack on Air-Tapping Keyboards in Virtual Environments

2022 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES (VR 2022), pp. 765–774.

By: U. Meteriz-Yildiran*, N. Yildiran*, A. Awad n & D. Mohaisen*

author keywords: Security and privacy; Privacy protections; Human-entered computing; Text input; Human-centered computing; Ubiquitous and mobile devices
TL;DR: This paper presents a keylogging inference attack to infer user inputs typed with in-air tapping keyboards, and shows that this attack achieves a pinpoint accuracy ranging from 40% to 87% within at most the top-500 candidate reconstructions. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 15, 2022

2022 journal article

ARES: Persistently Secure Non-Volatile Memory with Processor-transparent and Hardware-friendly Integrity Verification and Metadata Recovery

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 21(1).

TL;DR: This article designed and implemented ARES, a new FPGA-assisted processor-transparent security mechanism that aims at efficiently and effectively achieving all three aspects of a security triad—confidentiality, integrity, and recoverability—in modern embedded computing. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: March 7, 2022

2022 article

ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures

2022 IEEE INTERNATIONAL CONFERENCE ON REBOOTING COMPUTING, ICRC, pp. 13–23.

By: M. Plagge*, B. Feinberg*, J. McFarland n, F. Rothganger*, S. Agarwal*, A. Awad n, C. Hughes*, S. Cardwell*

author keywords: Machine Learning; Codesign Tools; Neuromorphic Computing; codesign
TL;DR: This work presents a codesign ecosystem that leverages an analytical tool, ATHENA, to accelerate design space exploration and evaluation of novel architectures. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: May 30, 2023

2022 article

Adaptive Security Support for Heterogeneous Memory on GPUs

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 213–228.

By: S. Yuan n, A. Awad n, A. Yudha*, Y. Solihin* & H. Zhou n

author keywords: GPUs; secure memory; heterogeneous memory; encryption; integrity check; security metadata cache
TL;DR: The security guarantees that used to defend against physical attacks are analyzed, and it is made the observation that heterogeneous GPU memory system may not always need all the security mechanisms to achieve the security guarantees. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 29, 2022

2022 journal article

DirectNVM: Hardware-accelerated NVMe SSDs for High-performance Embedded Computing

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 21(1).

By: Y. Zou*, A. Awad n & M. Lin*

author keywords: NVMe; SSDs; FPGA; high-Throughput high-Performance computing
TL;DR: The key idea is to exploit the massively parallel I/O queuing capability, provided by the NVMe storage system, through leveraging FPGAs’ reconfigurability and native hardware computing power to operate transparently to the main processor. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 7, 2022

2022 article

Eris: Fault Injection and Tracking Framework for Reliability Analysis of Open-Source Hardware

2022 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS 2022), pp. 210–220.

By: S. Nema n, J. Kirschner n, D. Adak n, S. Agarwal*, B. Feinberg*, A. Rodrigues*, M. Marinella*, A. Awad n

author keywords: Reliability; fault-injection; RISC-V; safety-critical; resilience; fault-tracking
TL;DR: Eris, a novel framework to identify vulnerable components in hardware designs through fault-injection and fault propagation tracking, builds on ESSENT—a fast C/C++ RTL simulation framework—to provide fault injection, fault tracking, and control-flow deviation detection capabilities for RTL designs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: September 26, 2022

2022 article

Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!

2022 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2022), pp. 490–502.

By: K. Abu Zubair n, D. Mohaisen* & A. Awad n

author keywords: Non-Volatile Memory; Direct-Access (DAX); Security; Privacy; Filesystem Encryption
TL;DR: A novel hardware/software co-design architecture is proposed that enables transparent filesystem encryption without sacrificing the direct-access feature of files in emerging NVMs with minimal change in OS and memory controller. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 29, 2022

2022 article

High-Fidelity Model Extraction Attacks via Remote Power Monitors

2022 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE CIRCUITS AND SYSTEMS (AICAS 2022): INTELLIGENT TECHNOLOGY IN THE POST-PANDEMIC ERA, pp. 328–331.

By: A. Dubey n, E. Karabulut n, A. Awad n & A. Aysu n

author keywords: Neural networks; model stealing; time-to-digital converters; secure virtualization
TL;DR: It is demonstrated that a remote monitor implemented with time-to-digital converters can be exploited to steal the weights from a hardware implementation of NN inference, which expands the attack vector to multi-tenant cloud FPGA platforms. (via Semantic Scholar)
Source: Web Of Science
Added: November 7, 2022

2022 article

Horus: Persistent Security for Extended Persistence-Domain Memory Systems

2022 55TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), pp. 1255–1269.

By: X. Han n, J. Tuck n & A. Awad n

author keywords: Non-Volatile Memory; eADR; secure memory
TL;DR: Horus, a novel EPD-aware secure memory implementation that reduces the overhead during draining period of EPD system by reducing memory accesses of secure metadata and shows that Horus reduces the draining time by 5x, compared with the naive baseline design. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: December 12, 2022

2022 article

Minerva: Rethinking Secure Architectures for the Era of Fabric-Attached Memory Architectures

2022 IEEE 36TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2022), pp. 258–268.

By: M. Alwadi*, R. Wang*, D. Mohaisen*, C. Hughes*, S. Hammond* & A. Awad n

UN Sustainable Development Goal Categories
Source: Web Of Science
Added: September 29, 2022

2022 journal article

Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 19(2), 1049–1063.

By: M. Alwadi*, K. Abu Zubair n, D. Mohaisen* & A. Awad n

author keywords: Encryption; Nonvolatile memory; Metadata; Computer crashes; Computer architecture; Secure architectures; persistent memory; non-volatile memories; crash consistency; secure recovery
TL;DR: This article proposes Phoenix, a practical novel scheme which relies on elegantly reproducing the cache content before a crash, however with minimal overheads, thus improving the NVM lifetime by 8x and overall Phoenix performance is better than the baseline. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: March 28, 2022

2022 journal article

SHELLCORE: Automating Malicious IoT Software Detection Using Shell Commands Representation

IEEE INTERNET OF THINGS JOURNAL, 9(4), 2485–2496.

By: H. Alasmary*, A. Anwar*, A. Abusnaina*, A. Alabduljabbar*, M. Abuhamad*, A. Wang*, D. Nyang*, A. Awad n, D. Mohaisen*

author keywords: Internet of Things (IoT) security; Linux shell commands; machine learning; malware detection
TL;DR: A first look at the tasks managed by shell commands in Linux-based IoT malware toward detection is provided and a neural network-based model, ShellCore, is built to detect malicious shell commands. (via Semantic Scholar)
Source: Web Of Science
Added: February 21, 2022

2022 article

Towards Resilient Analog In-Memory Deep Learning via Data Layout Re-Organization

PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 859–864.

TL;DR: The XORG framework is proposed that performs data layout organization for DNNs deployed on in-memory computing platforms and improves precision by optimizing the weight matrix to crossbar assignments at compile time. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: September 11, 2023

2022 article

Transpose-Xen: Virtualized Mixed-Criticality through Dynamic Allocation

37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, pp. 3–12.

By: J. McFarland n & A. Awad n

author keywords: Hypervisor; Dynamic Allocation; Real-Time Scheduling; Cloud Computing
TL;DR: This paper proposes Transpose-Xen, an adaptive hyper-visor scheduler capable of managing the scheduling of tasks of varying levels of criticality, including tasks with hard real-time constraints, which is able to execute multiple jobs of varying criticality by finding similarities between the resource needs of each task despite potentially executing from separate VMs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: April 4, 2023

2022 journal article

Understanding Internet of Things malware by analyzing endpoints in their static artifacts

COMPUTER NETWORKS, 206.

By: J. Choi*, A. Anwar*, A. Alabduljabbar*, H. Alasmary*, J. Spaulding*, A. Wang*, S. Chen*, D. Nyang*, A. Awad*, D. Mohaisen*

author keywords: Internet of Things; Endpoints; Malware
TL;DR: This paper analyzes IoT malware and focuses on the endpoints reachable on the public Internet, that play an essential part in the IoT malware ecosystem, to gain insights into the underlying dynamics in this ecosystem, such as the affinity between the dropzones and their target IP addresses, and the different patterns among endpoints. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: May 2, 2022

2021 article

DeACT: Architecture-Aware Virtual Memory Support for Fabric Attached Memory Systems

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 453–466.

By: V. Kommareddy*, C. Hughes*, S. Hammond* & A. Awad n

author keywords: disaggregated fabric attached memory systems; virtual memory; security
Source: Web Of Science
Added: July 26, 2021

2021 article

HERMES: Hardware-Efficient Speculative Dataflow Architecture for Bonsai Merkle Tree-Based Memory Authentication

2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), pp. 203–213.

By: Y. Zou*, A. Awad n & M. Lin*

TL;DR: HerMES is a hardware-efficient memory integrity engine specifically designed to deliver a crash-consistent BMT for NVM, capable of processing multiple outstanding counter requests in flight, which significantly improves both latency and throughput of all BMT operations through leveraging an asynchronous dataflow architecture and speculative execution. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: June 13, 2022

2021 article

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks

2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), pp. 776–789.

By: X. Wang*, B. Zhao*, R. Hou*, A. Awad n, Z. Tian* & D. Meng*

author keywords: Robust NAS network; adversarial example; DNN accelerator
TL;DR: A novel hardware architecture, NASGuard, is proposed, which enables efficient inference of robust NAS networks and leverages a heuristic multi-branch mapping model to improve the efficiency of the underlying computing resources. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: October 26, 2021

2021 article

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter

PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), pp. 1697–1702.

By: F. Yuan*, K. Wang*, R. Hou*, X. Li*, P. Li*, L. Zhao*, J. Ying*, A. Awad n, D. Meng*

author keywords: cache side channels; Cuckoo filters; detection-based mitigation
TL;DR: Security analysis shows the PiPoMonitor can effectively mitigate cross-core attacks and the Auto-Cuckoo filter is immune to reverse engineering attacks, and evaluation results indicate PiPo monitor has negligible impact on performance and the storage overhead is an order of magnitude lower than previous stateful approaches. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: July 18, 2022

2021 journal article

Resilient and Secure Hardware Devices Using ASL

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 17(2).

By: Q. Alasad*, J. Lin*, J. Yuan*, D. Fan* & A. Awad n

author keywords: Hardware security; logic encryption; emerging devices; ASLD; reverse engineering attacks and defenses; side-channel analysis attacks and countermeasures
TL;DR: It is shown that ASLD has another unique feature: identical power dissipation through the switching operations, where such properties can be effectively used to prevent PA and IC attacks, including reverse engineering attacks. (via Semantic Scholar)
Source: Web Of Science
Added: May 24, 2021

2021 article

Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories

2021 INTERNATIONAL SYMPOSIUM ON SECURE AND PRIVATE EXECUTION ENVIRONMENT DESIGN (SEED 2021), pp. 22–28.

By: M. Chowdhuryy*, R. Ewetz*, A. Awad n & F. Yao*

TL;DR: This work presents R-SAW, a novel side channel attack that aims to exfiltrate secrets from a victim process via passively observing execution timings that are correlated with secret-dependent PCM accesses, and demonstrates the first investigation of information leakage threats in PCM-based main memories. (via Semantic Scholar)
Source: Web Of Science
Added: June 20, 2022

2021 article

Stealth-Persist: Architectural Support for Persistent Applications in Hybrid Memory Systems

2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), pp. 139–152.

By: M. Alwadi*, V. Kommareddy*, C. Hughes*, S. Hammond* & A. Awad n

author keywords: persistent applications; hybrid memories
TL;DR: Stealth-Persist is proposed, a novel architecture support feature that allows applications that need persistence to run in the DRAM while maintaining the persistency features provided by the NVM, and creates the illusion of a persistent memory for the application to use, while utilizing theDRAM for performance optimizations. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: July 26, 2021

2021 article proceedings

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

By: A. Arafat*, Z. Guo* & A. Awad n

Event: 2021 IEEE Virtual Reality and 3D User Interfaces (VR)

author keywords: Human-centered computing; Gesture Computing; Virtual Key-logging Attack; Channel State Information
TL;DR: This is the first work that uses WiFi signals to recognize virtual keystrokes in VR headsets using channel state information (CSI) of WiFi signals, and the key idea behind VR -Spy is that the side-channel information of fine-granular hand movements associated with each virtual keystroke has a unique gesture pattern in the CSI waveforms. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, Crossref, NC State University Libraries
Added: August 23, 2021

2020 journal article

A Lightweight Memory Access Pattern Obfuscation Framework for NVM

IEEE COMPUTER ARCHITECTURE LETTERS, 19(2), 163–166.

By: Y. Che*, Y. Yang*, A. Awad n & R. Wang*

author keywords: Non-volatile memory (NVM); main memory; memory obfuscation; wear-leveling
TL;DR: A lightweight memory access pattern obfuscation framework for NVM is proposed, called O-NVM, a novel design that achieves both wear-leveling and obfuscation with an appealing level of performance and security (obfuscation) guarantees. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: January 19, 2021

2020 article

Guest Editors' Introduction to the Special Issue on Hardware Security

Awad, A., & Wang, R. (2020, November 1). IEEE TRANSACTIONS ON COMPUTERS, Vol. 69, pp. 1556–1557.

By: A. Awad n & R. Wang

author keywords: Special issues and sections; Hardware; Security; Computer architecture; System integration
TL;DR: The twelve papers in this special section address various topics related to hardware security: secure-by-design architectures, secure speculative execution, secure system integration of untrusted chiplets, malware detection, program analysis using power side channels, architecture support for forensics, and efficient implementations of security modules. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: October 26, 2020

2016 article

Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers

Awad, A., Manadhata, P., Haber, S., Solihin, Y., & Horne, W. (2016, April). ACM SIGPLAN NOTICES, Vol. 51, pp. 263–276.

By: A. Awad n, P. Manadhata*, S. Haber*, Y. Solihin n & W. Horne*

author keywords: Encryption; Hardware Security; Phase-Change Memory; Data Protection
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers

Operating Systems Review, 50(2), 263–276.

By: A. Awad n, P. Manadhata*, S. Haber*, Y. Solihin n & W. Horne*

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Non-volatile memory host controller interface performance analysis in high-performance I/O systems

Ieee international symposium on performance analysis of systems and, 145–154.

By: A. Awad n, B. Kettering* & Y. Solihin n

TL;DR: The system performance bottlenecks and overhead of using the standard state-of-the-art Non-volatile Memory Express (NVMe), or Non-Volatile Memory Host Controller Interface (NVMHCI) Specification as representative for NVM host controller interfaces are investigated. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

STM : Cloning the spatial and temporal memory access behavior

International symposium on high-performance computer, 237–247.

By: A. Awad n & Y. Solihin n

TL;DR: A new memory access behavior cloning technique that captures both temporal and spatial locality is proposed, abbreviated as Spatio-Temporal Memory (STM) cloning, and a new profiling method and statistics that capture stride patterns and transition probabilities are proposed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.