CNRS

Displaying 1-40 of 243 results

  • White Papers // May 2014

    Large Pages May Be Harmful on NUMA Systems

    Application virtual address space is divided into pages, each requiring a virtual-to-physical translation in the page table and the TLB. Large working sets, common among modern applications, necessitate a lot of translations, which increases memory consumption and leads to high TLB and page fault rates. To address this problem, recent...

    Provided By CNRS

  • White Papers // Apr 2014

    Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors

    The authors introduce and experimentally validate a new macro-level model of the CPU temperature/power relationship within nanometer-scale application processors or system-on-chips. By adopting a holistic view, this model is able to take into account many of the physical effects that occur within such systems. Together with two algorithms described in...

    Provided By CNRS

  • White Papers // Mar 2014

    POSH: Paris OpenSHMEM A High-Performance OpenSHMEM Implementation for Shared Memory Systems

    The drive toward many-core architectures has been tremendous during the last decade. Along with this trend, the community has been searching, investigating and looking for programming models that provide both control on the data locality and flexibility of the data handling. In this paper, the authors present the design and...

    Provided By CNRS

  • White Papers // Mar 2014

    Searching for Sinks of Henon Map Using a Multiple-Precision GPU Arithmetic Library

    Today, GPUs represent an important hardware development platform for many problems in dynamical systems, where massive parallel computations are needed. Besides that, many numerical studies of chaotic dynamical systems require a computing precision higher than common Floating Point (FP) formats. One such application is locating invariant sets for chaotic dynamical...

    Provided By CNRS

  • White Papers // Feb 2014

    Query Processing for SPARQL Federations with Data Replication

    Data replication and deployment of local SPARQL endpoints improve scalability and availability of public SPARQL endpoints, making the consumption of Linked Data a reality. This solution requires synchronization and specific query processing strategies to take advantage of replication. However, existing replication aware techniques in federations of SPARQL endpoints do not...

    Provided By CNRS

  • White Papers // Jan 2014

    Control of Multiple Remote Servers for Quality-Fair Delivery of Multimedia Contents

    This paper proposes a control scheme for the quality-fair delivery of several encoded video streams to mobile users sharing a common wireless resource. Video quality fairness, as well as similar delivery delays is targeted among streams. The proposed controller is implemented within some aggregator located near the bottleneck of the...

    Provided By CNRS

  • White Papers // Jan 2014

    Formal Modeling and Evaluation of Stateful Service-based Business Process Elasticity in the Cloud

    Cloud environments are being increasingly used for deploying and executing business processes and particularly Service-based Business Processes (SBPs). One of the expected features of cloud environments is elasticity at different levels. It is obvious that provisioning of elastic platforms is not sufficient to provide elasticity of the deployed business process....

    Provided By CNRS

  • White Papers // Dec 2013

    Multi-Hop Counter Based Data Dissemination Protocol for Communicating Materials

    The communicating material is a new paradigm of Internet of Things. It is designed to perform efficient product control and ensure an information continuum all along the product life cycle. Therefore, storage of life cycle information and data dissemination in communicating materials are very important issues. This paper provides a...

    Provided By CNRS

  • White Papers // Dec 2013

    Privacy Preserving Minimal Observability for Composite Transactional Services

    For complex services composed of many (component) services, logging is an integral middleware aspect, especially for providing transactions and monitoring. In the event of a failure, the log allows one to deduce the cause of failure (diagnosis) and recover by compensating the executed services (atomicity). However, for heterogeneous services with...

    Provided By CNRS

  • White Papers // Dec 2013

    Formally Proved Security of Assembly Code Against Power Analysis

    In the authors keynote speech at CHES 2004, kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. This failure is due to the fact that...

    Provided By CNRS

  • White Papers // Nov 2013

    On the Semantics of Object-Oriented Data Structures and Path Expressions

    UML/OCL is perceived as the de-facto standard for specifying object-oriented models in general and data models in particular. Since recently, all data types of UML/OCL comprise two different exception elements: invalid (\"Bottom\" in semantics terminology) and null (for \"Non-existing element\"). This paper has far-reaching consequences on both the logical and...

    Provided By CNRS

  • White Papers // Nov 2013

    Tackling Real-Time Signal Processing Applications on Shared Memory Multicore Architectures Using XPU

    General-purpose shared memory multi-core architectures are becoming widely available. They are likely to stand as attractive alternatives to more specialized processing architectures such as FPGA and DSP-based platforms to perform real-time digital signal processing. In this paper, the authors show how they can ease parallelism expression on shared memory multi-core...

    Provided By CNRS

  • White Papers // Nov 2013

    Efficient Multi-GPU Algorithm for All-Pairs Shortest Paths

    The shortest-path problem is a fundamental computer science problem with applications in diverse areas such as transportation, robotics, network routing, and VLSI design. The problem is to find paths of minimum weight between pairs of nodes in edge-weighted graphs, where the weight of a path p is defined as the...

    Provided By CNRS

  • White Papers // Nov 2013

    A Survey of RDB to RDF Translation Approaches and Tools

    Relational databases scattered over the web are generally opaque to regular web crawling tools. To address this concern, many RDB-to-RDF approaches have been proposed over the last years. In this paper, the authors propose a detailed review of RDB-to-RDF methods and tools, considering end-to-end projects that delivered operational tools. The...

    Provided By CNRS

  • White Papers // Oct 2013

    On the Validity of Flow-level TCP Network Models for Grid and Cloud Simulations

    Researchers in the area of grid/cloud computing perform many of their experiments using simulations that must capture network behavior. In this context, packet-level simulations, which are widely used to study network protocols, are too costly given the typical large scales of simulated systems and applications. An alternative is to implement...

    Provided By CNRS

  • White Papers // Oct 2013

    Embedded Data on Intelligent Products - Impact on Real-Time Applications

    New challenges and opportunities arise with the Internet of Things (IoT), making it possible to link any objects of the real world with the virtual one. In recent years, IoT has become increasingly popular in industrial applications (e.g. for the inclusion of data related to the product history). It might...

    Provided By CNRS

  • White Papers // Sep 2013

    Fact Checking and Analyzing the Web

    Tools for authoring electronic content and sharing it through the Internet are very widely adopted by now. First blogs, and then social networks, grew more or less in parallel with the major media providers' move towards allowing users to record their opinions next to the papers. These technical means to...

    Provided By CNRS

  • White Papers // Sep 2013

    Leveraging Ontologies upon a Holistic Privacy-aware Access Control Model

    Access control is a crucial concept in both ICT security and privacy, providing for the protection of system resources and personal data. The increasing complexity of nowadays systems has led to a vast family of solutions fostering comprehensive access control models, with the ability to capture a variety of parameters...

    Provided By CNRS

  • White Papers // Sep 2013

    Query Rewriting for Rule Mining in Databases

    Promoting declarative approaches in data mining is a long standing theme. This paper goes into this direction by proposing a well-founded logical query language, SafeRL, allowing the expression of a wide variety of \"Rules\" to be discovered against the data. SafeRL extends and generalizes functional dependencies in databases to new...

    Provided By CNRS

  • White Papers // Sep 2013

    Visual Analysis of Complex Networks for Business Intelligence with Gephi

    The recent availability of a vast amount of data from Online Social Networks (OSN) and from the Web has opened promising perspectives for the field of Business Intelligence (BI), in particular for the monitoring of brand e-reputation and for the management of customer relationships. Platforms which combine data mining algorithms...

    Provided By CNRS

  • White Papers // Jul 2013

    Pre- and Post-Scheduling Memory Allocation Strategies on MPSoCs

    In this paper, the authors introduce and assesses a new method to allocate memory for applications implemented on a shared memory Multi-Processor System-on-Chip (MPSoC). This method first consists of deriving, from a Synchronous Data-Flow (SDF) algorithm description, a Memory Exclusion Graph (MEG) that models all the memory objects of the...

    Provided By CNRS

  • White Papers // Jul 2013

    Towards a Secure Identity Management in Smartphone Environments

    Mobile network operators are providing identification and authentication means to their subscribers through SIM-cards. IDentity Management (IDM) is a hot topic today for mobile network operators and service providers, especially when the terminal is a Smartphone. This paper addresses the encountered security issues of Smartphone's to support identity management. Then...

    Provided By CNRS

  • White Papers // Jul 2013

    Deduction Soundness: Prove One, Get Five for Free

    Most computational soundness theorems deal with a limited number of primitives, thereby limiting their applicability. The notion of deduction soundness of cortier and warinschi (CCS'11) aims to facilitate soundness theorems for richer frameworks via composition results: deduction soundness extends, generically, with asymmetric encryption and public data structures. Unfortunately, that paper...

    Provided By CNRS

  • White Papers // Jul 2013

    Scheduling Analysis from Architectural Models of Embedded Multi-Processor Systems

    As embedded systems need more and more computing power, many products require hardware platforms based on multiple processors. In case of real-time constrained systems, the use of scheduling analysis tools is mandatory to validate the design choices, and to better use the processing capacity of the system. To this end,...

    Provided By CNRS

  • White Papers // Jul 2013

    An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies

    As network attacks become more complex, defence strategies must provide means to handle more flexible and dynamic requirements. The Multiprotocol Label Switching (MPLS) standard is a promising method to properly handle suspicious flows participating in such network attacks. Tasks such as alert data extraction, and MPLS routers configuration present an...

    Provided By CNRS

  • White Papers // Jul 2013

    Surveying Collaborative and Content Management Platforms for Enterprise

    The continuous increasing of the information quantity in enterprises encourages the adoption of an Enterprise Content Management (ECM) that evolves as an integrated approach to information management. By observing the trend toward adoption of Web based collaboration tools in the enterprise, the authors focus, in this paper, on ECM platforms...

    Provided By CNRS

  • White Papers // Jul 2013

    Security for Future Networks : a Prospective Study of AAIs

    The future internet will rely heavily on virtualization and cloud networking. The project security for future networks proposes the design of a framework providing secure identification and authentication, secure data transfer and secure virtualized infrastructure. In this paper, the authors present a comparative study should examine some models and frameworks...

    Provided By CNRS

  • White Papers // Jun 2013

    Fast and Efficient FPGA Implementation of Connected Operators

    The Connected Component Tree (CCT)-based operators play a central role in the development of new algorithms related to image processing applications such as pattern recognition, video-surveillance or motion extraction. The CCT construction, being a time consuming task (about 80% of the application time), these applications remain far-off mobile embedded systems....

    Provided By CNRS

  • White Papers // Jun 2013

    Blind Calibration in Compressed Sensing Using Message Passing Algorithms

    In this paper the authors study the so-called blind calibration, i.e. when the training signals that are available to perform the calibration are sparse but unknown. They extend the Approximate Message Passing (AMP) algorithm used in CS to the case of blind calibration. In the calibration-AMP, both the gains on...

    Provided By CNRS

  • White Papers // Jun 2013

    Knowledge Harvesting For Business Intelligence

    Over the past few years and with the continuous and rapid growth of information volume, information access and knowledge management, in the enterprises and on the web have become challenging. With the growth rate of information volume, information access and knowledge management in enterprises has become challenging. This paper aims...

    Provided By CNRS

  • White Papers // Jun 2013

    Symmetry Breaking for Multi-Criteria Mapping and Scheduling on Multicores

    Multiprocessor mapping and scheduling is a long-old difficult problem. In this paper the authors propose a new methodology to perform mapping and scheduling along with buffer memory optimization using an SMT solver. They target split-join graphs, a formalism inspired by Synchronous Data-Flow (SDF) which provides a compact symbolic representation of...

    Provided By CNRS

  • White Papers // May 2013

    PiMM: Parameterized and Interfaced Dataflow Meta-Model for MPSoCs Runtime Reconfiguration

    Dataflow models of computation are widely used for the specification, analysis, and optimization of Digital Signal Processing (DSP) applications. In this paper, a new meta-model called PiMM is introduced to address the important challenge of managing dynamics in DSP-oriented representations. PiMM extends a dataflow model by introducing an explicit parameter...

    Provided By CNRS

  • White Papers // May 2013

    Balanced Task Clustering in Scientific Workflows

    Scientific workflows can be composed of many fine computational granularity tasks. The runtime of these tasks may be shorter than the duration of system overheads, for example, when using multiple resources of a cloud infrastructure. Task clustering is a runtime optimization technique that merges multiple short tasks into a single...

    Provided By CNRS

  • White Papers // May 2013

    Error Resilience Exploration in 3D Systems

    In this paper, the authors will present first features of a new resilient exploration tool, ERX, able to propose robustness improvements for 3D NOCs architectures. The tool is able to deal with embedded multi cores architectures. Based on constraints coming from technology side, such as permanent defect rates or transient...

    Provided By CNRS

  • White Papers // May 2013

    Secure Information Transmission Based on Physical Principles

    The authors employ physical properties of the real world to design a protocol for secure information transmission where one of the parties is able to transmit secret information to another party over an insecure channel, without any prior secret arrangements between the parties. The distinctive feature of this protocol, compared...

    Provided By CNRS

  • White Papers // Apr 2013

    ID-Based Cryptography for Secure Cloud Data Storage

    In this paper, the authors address the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-based cryptography. Their solution has several advantages....

    Provided By CNRS

  • White Papers // Apr 2013

    Efficient Malware Detection Using Model-Checking

    Over the past decade, malware costs more than $10 billion every year and the cost is still increasing. Classical signature-based and emulation-based methods are becoming insufficient, since malware writers can easily obfuscate existing malware such that new variants cannot be detected by these methods. Thus, it is important to have...

    Provided By CNRS

  • White Papers // Apr 2013

    Risk Indicators with Several Lines of Business: Comparison, Asymptotic Behavior and Applications to Optimal Reserve Allocation

    In a multi-dimensional risk model with dependent lines of business, the authors propose to allocate capital with respect to the minimization of some risk indicators. These indicators are sums of expected penal-ties due to the insolvency of a branch while the global reserve is either positive or negative. Explicit formulas...

    Provided By CNRS

  • White Papers // Mar 2013

    Attribute-based Mining Process for the Organization-Based Access Control Model

    Since the late 60's, different security access control models have been proposed. Their rationale is to conceive high level abstract concepts that permit to manage the security policies of organizations efficiently. However, enforcing these models is not a straightforward task, especially when they do not consider the reality of organizations...

    Provided By CNRS

  • White Papers // Mar 2013

    Optimizing QoS InWireless Sensors Networks Using a Caching Platform

    This paper addresses monitoring and surveillance applications using Wireless Sensors Networks (WSNs). In this context, several remote clients are interested in receiving the information collected by the nodes of a WSN. As WSN devices are most of the time constrained in energy and processing, the authors present a caching architecture...

    Provided By CNRS

  • White Papers // Jan 2012

    Business Process Evolution: a Rule-based Approach

    Business Process (BP) evolution is a key aspect of BP lifecycle. There are several reasons that may cause BP modifications. Among these, particularly important are the changes of the enterprise organization and operation strategies, which can be captured by Business Rules (BRs). The authors focus here on a BP-based enterprise...

    Provided By CNRS

  • White Papers // Jun 2013

    Knowledge Harvesting For Business Intelligence

    Over the past few years and with the continuous and rapid growth of information volume, information access and knowledge management, in the enterprises and on the web have become challenging. With the growth rate of information volume, information access and knowledge management in enterprises has become challenging. This paper aims...

    Provided By CNRS

  • White Papers // Dec 2012

    A Quality Based Approach for the Analysis and Design of Business Process Models

    In recent years, the problems related to modeling and improving business processes has been of growing interest. The scientific problem addressed in this paper consists in modeling and improving Business Process (BP) models quality. This problem is of growing interest as companies are realizing the undeniable impact of a better...

    Provided By CNRS

  • White Papers // Nov 2011

    Business Rules Generation methods by Merging Model Driven Architecture and Web Semantics

    The increasing complexity of the information systems must be taking into account for new technologies, and the appearance of new types of requirements raise new problems that the traditional engineering approaches of the information systems cannot always solve in an adapted way. Business Rules constitute a key element of the...

    Provided By CNRS

  • White Papers // Jun 2006

    Corporate Information Systems Architecture for Business Intelligence Solutions

    One of the most important elements in decision-making is the availability of information which is used in the management of organizations. In this paper, the authors present the method SIMBIOSIS (System of Indicators for Managing Business Intelligence Oriented Strategic Information System). This method considers the two basic levels of decision-making...

    Provided By CNRS

  • White Papers // Sep 2012

    Establishing Enterprise Business Context (eBC) for Service Policy Decision in Mobile Broadband Networks

    Empowering the enterprise to control their own session policy for mobile broadband is not only necessary for consumerization, but for the enterprise to control costs and protect corporate network resources. The authors propose a practical method of establishing dynamically enterprise-Business-Context (eBC) status to determine whether or not the enterprise should...

    Provided By CNRS

  • White Papers // Jun 2012

    Matching ERP System Functionality to Customer Requirements

    Although procuring Enterprise Resource Planning systems from commercial suppliers is becoming increasingly popular in the authors' industry, fitting those systems to customer requirements remains problematic. In this paper, they propose an approach for matching ERP system functionality to customer requirements. The assumption made is that the ERP system postulates a...

    Provided By CNRS

  • White Papers // Jun 2012

    Bridging The Gap Between Organisational Needs And ERP Functionality

    The authors argue that ERP installations are difficult to align to specific requirements of the enterprise because of the low level at which ERP functionality is described. They raise this level from a functional description to a goal-oriented one. They use SAP R/3 to illustrate this. A SAP goal expresses...

    Provided By CNRS

  • White Papers // May 2011

    Organizational Consequences Linked to the Incorporation of ERP Into Companies' Service-Marketing Activities

    ERPs offer a two-fold answer to the need for integration. The first is technical in nature, since the architecture of these programs is designed to ensure the compatibility of their software components and the transparency of their data. They also offer a dynamic approach, because ERPs are mechanisms for incorporating...

    Provided By CNRS

  • White Papers // Jun 2012

    Design and Logistics IT Federation Through Product Lifecycle Support Standard

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of IT systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to a coherent...

    Provided By CNRS

  • White Papers // Jan 2013

    A Multiagent Approach for Modelling SMEs Mechatronic Supply Chains

    In this paper, the authors discuss about the application of multiagent system for modelling supply chains involving Small and Medium Enterprises (SMEs) in the mechatronic industry. This paper is a combination of two research scopes. The first one deals with the identification of the different concepts able to model the...

    Provided By CNRS

  • White Papers // Dec 2009

    System of Enterprise-Systems Integration Issues an Engineering Perspective

    Today's needs for more capable enterprise systems in a short timeframe is leading more organizations toward the integration of existing component-systems into broader intra-organizational enterprise-systems and their integration into inter-organizational systems of enterprise-systems. Although important R&D efforts lead to a general consensus that Enterprise Modeling and IT Systems Interoperability are...

    Provided By CNRS

  • White Papers // Jan 2012

    Evaluating Choreographies in BPMN 2.0 Using an Extended Quality Framework

    The notion of choreography has emerged over the past years as a foundational concept for capturing and managing collaborative business processes. This concept has been adopted as a first-class citizen in the latest version of the Business Process Modeling Notation (BPMN 2.0). However, it remains an open question whether or...

    Provided By CNRS

  • White Papers // Sep 2011

    Unconstrained Keystroke Dynamics Authentication with Shared Secret

    Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and cheap as no additional sensor is required for authenticating the user before accessing to an application. In the last thirty years, many researchers have proposed, different algorithms...

    Provided By CNRS

  • White Papers // Apr 2013

    Efficient Malware Detection Using Model-Checking

    Over the past decade, malware costs more than $10 billion every year and the cost is still increasing. Classical signature-based and emulation-based methods are becoming insufficient, since malware writers can easily obfuscate existing malware such that new variants cannot be detected by these methods. Thus, it is important to have...

    Provided By CNRS

  • White Papers // Oct 2007

    Securing Wireless Sensor Networks Against Aggregator Compromises

    A common approach to overcome the limited nature of sensor networks is to aggregate data at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security mainly because sensor networks are extremely vulnerable to node compromises. The authors propose three schemes to secure data aggregation that rely...

    Provided By CNRS

  • White Papers // Aug 2011

    Unified Nuclear Core Activity Map Reconstruction Using Heterogeneous Instruments with Data Assimilation

    Evaluating the neutronic state of the whole nuclear core is a very important topic that has strong implication for nuclear core management and for security monitoring. The core state is evaluated using measurements. Usually, part of the measurements is used, and only one kind of instruments is taken into account....

    Provided By CNRS

  • White Papers // Dec 2012

    A Multipath Routing Strategy to Prevent Flooding Disruption Attacks in Link State Routing Protocols for MANETs

    Multipath routing has been proposed to increase resilience against network failures or improve security in Mobile Ad-Hoc NETworks (MANETs). The Optimized Link State Routing (OLSR) protocol has been adopted by several multipath routing strategies. They implement Multi-Point Relay (MPRs) nodes as a flooding mechanism for distributing control information. Ideally, the...

    Provided By CNRS

  • White Papers // Mar 2013

    Attribute-based Mining Process for the Organization-Based Access Control Model

    Since the late 60's, different security access control models have been proposed. Their rationale is to conceive high level abstract concepts that permit to manage the security policies of organizations efficiently. However, enforcing these models is not a straightforward task, especially when they do not consider the reality of organizations...

    Provided By CNRS

  • White Papers // Jul 2013

    An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies

    As network attacks become more complex, defence strategies must provide means to handle more flexible and dynamic requirements. The Multiprotocol Label Switching (MPLS) standard is a promising method to properly handle suspicious flows participating in such network attacks. Tasks such as alert data extraction, and MPLS routers configuration present an...

    Provided By CNRS

  • White Papers // Oct 2008

    SWIFFTX: A Proposal for the SHA-3 Standard

    In this paper the authors describe the SWIFFTX hash function. It is part of the authors' submission package to the SHA-3 hash function competition. The SWIFFTX compression functions have a simple and mathematically elegant design. This makes them highly amenable to analysis and optimization. In addition, they enjoy two unconventional...

    Provided By CNRS

  • White Papers // May 2010

    Scientific Workflow Development Using both Visual and Script-based Representation

    In this paper the authors propose to achieve a semantic equivalence between a visual- and a script-based workflow development paradigm. They accomplish this by building a script language which execution semantics matches an existing sophisticated, data-parallel scientific workflow language and its underlying GUI-based core workflow enactor. It facilitates multiple representations...

    Provided By CNRS

  • White Papers // Jan 2014

    Formal Modeling and Evaluation of Stateful Service-based Business Process Elasticity in the Cloud

    Cloud environments are being increasingly used for deploying and executing business processes and particularly Service-based Business Processes (SBPs). One of the expected features of cloud environments is elasticity at different levels. It is obvious that provisioning of elastic platforms is not sufficient to provide elasticity of the deployed business process....

    Provided By CNRS

  • White Papers // Jul 2013

    Security for Future Networks : a Prospective Study of AAIs

    The future internet will rely heavily on virtualization and cloud networking. The project security for future networks proposes the design of a framework providing secure identification and authentication, secure data transfer and secure virtualized infrastructure. In this paper, the authors present a comparative study should examine some models and frameworks...

    Provided By CNRS

  • White Papers // May 2013

    PiMM: Parameterized and Interfaced Dataflow Meta-Model for MPSoCs Runtime Reconfiguration

    Dataflow models of computation are widely used for the specification, analysis, and optimization of Digital Signal Processing (DSP) applications. In this paper, a new meta-model called PiMM is introduced to address the important challenge of managing dynamics in DSP-oriented representations. PiMM extends a dataflow model by introducing an explicit parameter...

    Provided By CNRS

  • White Papers // Jul 2013

    Pre- and Post-Scheduling Memory Allocation Strategies on MPSoCs

    In this paper, the authors introduce and assesses a new method to allocate memory for applications implemented on a shared memory Multi-Processor System-on-Chip (MPSoC). This method first consists of deriving, from a Synchronous Data-Flow (SDF) algorithm description, a Memory Exclusion Graph (MEG) that models all the memory objects of the...

    Provided By CNRS

  • White Papers // Jun 2012

    R-MOM: A Component-Based Framework for Interoperable and Adaptive Asynchronous Middleware Systems

    Systems of Systems (SoS) are composed of subsystems such as distributed, information technology, real-time and embedded systems. Among distributed systems, Message-Oriented Middleware (MOM) is used by SoS in order to share status information from system elements (component, service, etc.). Often several different MOM technologies are used in one SoS, then...

    Provided By CNRS

  • White Papers // Dec 2011

    Affine Vector Cache for Memory Bandwidth Savings

    Preserving memory locality is a major issue in highly-multithreaded architectures such as GPUs. These architectures hide latency by maintaining a large number of threads in flight. As each thread needs to maintain a private working set, all threads collectively put tremendous pressure on on-chip memory arrays, at significant cost in...

    Provided By CNRS

  • White Papers // Sep 2011

    Stack-Less SIMT Reconvergence at Low Cost

    Parallel architectures following the SIMT model such as GPUs benefit from application regularity by issuing concurrent threads running in lockstep on SIMD units. As threads take different paths across the control-flow graph, lockstep execution is partially lost, and must be regained whenever possible in order to maximize the occupancy of...

    Provided By CNRS

  • White Papers // Sep 2012

    A Cache Management Strategy to Replace Wear Leveling Techniques for Embedded Flash Memory

    Prices of NAND flash memories are falling drastically due to market growth and fabrication process mastering while research efforts from a technological point of view in terms of endurance and density are very active. NAND flash memories are becoming the most important storage media in mobile computing and tend to...

    Provided By CNRS

  • White Papers // Jun 2013

    Fast and Efficient FPGA Implementation of Connected Operators

    The Connected Component Tree (CCT)-based operators play a central role in the development of new algorithms related to image processing applications such as pattern recognition, video-surveillance or motion extraction. The CCT construction, being a time consuming task (about 80% of the application time), these applications remain far-off mobile embedded systems....

    Provided By CNRS

  • White Papers // May 2011

    Localization of Damaged Resources in NoC Based Shared-Memory MP2SOC, Using a Distributed Cooperative Configuration Infrastructure

    In this paper, the authors present a software approach for localization of faulty components in a 2D-mesh Network-on-Chip, targeting fault tolerance in a shared memory MP2SoC architecture. They use a pre-existing and distributed hardware infrastructure supporting self-test and de-activation of the faulty components (routers and communication channels), that are transformed...

    Provided By CNRS

  • White Papers // Feb 2012

    Task Model and Online Operating System API for Hardware Tasks in OLLAF Platform

    In this paper, the authors present an original hardware task model and the corresponding online API for fine grained dynamically reconfigurable architecture. They cover the integration of this API in the OLLAF platform and more specifically its application to memory access management in a dynamically reconfigurable environment. Methods offered by...

    Provided By CNRS

  • White Papers // Dec 2011

    Relativistic Causality and Clockless Circuits

    Time plays a crucial role in the performance of computing systems. The accurate modeling of logical devices, and of their physical implementations, requires an appropriate representation of time and of all properties that depend on this notion. The need for a proper model, particularly acute in the design of clockless...

    Provided By CNRS

  • White Papers // Dec 2010

    Automatic Method for Efficient Hardware Implementation From RVC-CAL Dataflow: A LAR Coder Baseline Case Study

    Implementing an algorithm to hardware platforms is generally not an easy task. The algorithm, typically described in a high-level specification language, must be translated to a low-level HDL language. The difference between models of computation (sequential versus fine-grained parallel) limits the efficiency of automatic translation. On the other hand, manual...

    Provided By CNRS

  • White Papers // May 2011

    Fully Distributed Initialization Procedure for a 2D-Mesh NoC, Including Off-Line BIST and Partial Deactivation of Faulty Components

    In this paper, the authors present an embedded, at speed, off-line, and fully distributed initialization procedure for 2DMesh Network-on-Chip (NoC). This procedure is executed at power boot, and targets the detection and the deactivation of the faulty routers and/or faulty communication channels. The final objective is fault tolerance. The proposed...

    Provided By CNRS

  • White Papers // May 2010

    Simulator Generation Using an Automaton Based Pipeline Model for Timing Analysis

    Hardware simulation is an important part of the design of embedded and/or real-time systems. It can be used to compute the Worst Case Execution Time (WCET) and to provide a mean to run software when final hardware is not yet available. Building a simulator is a long and difficult task,...

    Provided By CNRS

  • White Papers // Feb 2013

    Dynamically Adaptable NoC Router Architecture for Multiple Pixel Streams Applications

    Modern computing systems for vision have to support advanced image applications. They involve several heterogeneous pixel streams and they have to respect hard timing and area constraints. To face those challenges, an adaptable ring-based interconnection Network-on-Chip (NoC) has been recently proposed. This NoC is based on a new router architecture,...

    Provided By CNRS

  • White Papers // Sep 2013

    Fact Checking and Analyzing the Web

    Tools for authoring electronic content and sharing it through the Internet are very widely adopted by now. First blogs, and then social networks, grew more or less in parallel with the major media providers' move towards allowing users to record their opinions next to the papers. These technical means to...

    Provided By CNRS

  • White Papers // Dec 2013

    Multi-Hop Counter Based Data Dissemination Protocol for Communicating Materials

    The communicating material is a new paradigm of Internet of Things. It is designed to perform efficient product control and ensure an information continuum all along the product life cycle. Therefore, storage of life cycle information and data dissemination in communicating materials are very important issues. This paper provides a...

    Provided By CNRS