The China Press Berhad

Displaying 1-40 of 49 results

  • White Papers // May 2014

    Efficient Hybrid Inline and Out-of-line Deduplication for Backup Storage

    Backup storage systems often remove redundancy across backups via inline deduplication, which works by referring duplicate chunks of the latest backup to those of existing backups. However, inline deduplication degrades restore performance of the latest backup due to fragmentation, and complicates deletion of expired backups due to the sharing of...

    Provided By The China Press Berhad

  • White Papers // Jan 2014

    Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-coded Clustered Storage

    Many modern storage systems adopt erasure coding to provide data availability guarantees with low redundancy. Log-based storage is often used to append new data rather than overwrite existing data so as to achieve high update efficiency, but introduces significant I/O overhead during recovery due to reassembling updates from data and...

    Provided By The China Press Berhad

  • White Papers // Jan 2014

    STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures in Practical Storage Systems

    Practical storage systems often adopt erasure codes to tolerate device failures and sector failures, both of which are prevalent in the field. However, traditional erasure codes employ device-level redundancy to protect against sector failures, and hence incur significant space overhead. Recent Sector-Disk (SD) codes are available only for limited configurations...

    Provided By The China Press Berhad

  • White Papers // Jul 2013

    Stochastic Analysis on RAID Reliability for Solid-State Drives

    Solid-State drives (SSDs) have been widely deployed in desktops and data centers. However, SSDs suffer from bit errors, and the bit error rate is time dependent since it increases as an SSD wears down. Traditional storage systems mainly use parity-based RAID to provide reliability guarantees by striping redundancy across multiple...

    Provided By The China Press Berhad

  • White Papers // May 2013

    Symmetry in Distributed Storage Systems

    The max-flow outer bound is achievable by regenerating codes for functional repair distributed storage system. However, the capacity of exact repair distributed storage system is an open problem. In this paper, the linear programming bound for exact repair distributed storage systems is formulated. A notion of symmetrical sets for a...

    Provided By The China Press Berhad

  • White Papers // Apr 2013

    On Hardware Trojan Design and Implementation at Register-Transfer Level

    There have been a number of Hardware Trojan (HT) designs at Register-Transfer Level (RTL) in the literature, which mainly describe their malicious behaviors and trigger mechanisms. Generally speaking, the stealthiness of the HTs is shown with extremely low sensitization probability of the trigger events. In practice, however, based on the...

    Provided By The China Press Berhad

  • White Papers // Apr 2013

    Optimization for Timing-Speculated Circuits by Redundancy Addition and Removal

    Integrated Circuits (ICs) suffer from severe variation effects with technology scaling, making their timing behavior increasingly unpredictable. Timing speculation is a promising technique to tackle this problem with the help of online timing error detection and correction mechanisms. In this paper, the authors propose to use Redundancy Addition and Removal...

    Provided By The China Press Berhad

  • White Papers // Mar 2013

    Wireless Broadcast with Physical-Layer Network Coding

    In this paper, the authors investigate the maximum broadcast throughput and its achievability in multi-hop wireless networks with half-duplex node constraint. They allow the use of Physical-layer Network Coding (PNC). Although the use of PNC for unicast has been extensively studied, to their best knowledge, there has been little, if...

    Provided By The China Press Berhad

  • White Papers // Mar 2013

    DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware

    Smartphone's are becoming prevailing devices for many people. Unfortunately, malware on Smartphone's is also increasing at an unprecedented rate. Android OS-based systems, being the most popular platform for mobile devices, have been a popular target for malware developers. As stated in, the exponential growth of mobile malware is mainly due...

    Provided By The China Press Berhad

  • White Papers // Feb 2013

    FRANTIC: A Fast Reference-Based Algorithm for Network Tomography Via Compressive Sensing

    The authors study the problem of link and node delay estimation in undirected networks when at most k out of n links or nodes in the network is congested. Their approach relies on end-to-end measurements of path delays across pre-specified paths in the network. They present a class of algorithms...

    Provided By The China Press Berhad

  • White Papers // Jan 2013

    On AVCs With Quadratic Constraints

    In this paper, the authors study an Arbitrarily Varying Channel (AVC) with quadratic power constraints on the transmitter and a so-called "Oblivious" jammer (along with additional AWGN) under a maximum probability of error criterion, and no private randomness between the transmitter and the receiver. This is in contrast to similar...

    Provided By The China Press Berhad

  • White Papers // Jan 2013

    Reliable Deniable Communication: Hiding Messages in Noise

    Alice is in jail, and may wish to communicate reliably with Bob in the neighboring cell, over n uses of a noisy BSC (if she stays silent, the input to the channel is all zeroes). Unfortunately, the warden Willie is monitoring Alice (though his observations are significantly noisier, since his...

    Provided By The China Press Berhad

  • White Papers // Jan 2013

    Database-Assisted Distributed Spectrum Sharing

    According to FCC's ruling for white-space spectrum access, white-space devices are required to query a database to determine the spectrum availability. In this paper, the authors study the database-assisted distributed whitespace Access Point (AP) network design. They first model the cooperative and non-cooperative channel selection problems among the APs as...

    Provided By The China Press Berhad

  • White Papers // Feb 2012

    Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers

    Energy consumption represents a significant cost in data center operation. A large fraction of the energy, however, is used to power idle servers when the workload is low. Dynamic provisioning techniques aim at saving this portion of the energy, by turning off unnecessary servers. In this paper, the authors explore...

    Provided By The China Press Berhad

  • White Papers // Feb 2012

    Linear Network Code for Erasure Broadcast Channel with Feedback: Complexity and Algorithms

    In this paper, the authors investigate the construction of linear network codes for broadcasting a set of data packets to a number of users. The links from the source to the users are modeled as independent erasure channels. Users are allowed to inform the source node whether a packet is...

    Provided By The China Press Berhad

  • White Papers // Feb 2012

    Analog Network Coding in General SNR Regime

    The problem of maximum rate achievable with analog network coding for a unicast communication over a layered relay network with directed links is considered. A relay node performing analog network coding scales and forwards the signals received at its input. Recently this problem has been considered with two conditions: each...

    Provided By The China Press Berhad

  • White Papers // Nov 2011

    Yield Enhancement for 3D-Stacked ICs: Recent Advances and Challenges

    Three-Dimensional (3D) Integrated Circuits (ICs) that stack multiple dies vertically using Through-Silicon Vias (TSVs) have gained wide interests of the semiconductor industry. The shift towards volume production of 3D-stacked ICs, however, requires their manufacturing yield to be commercially viable. Various techniques have been presented in the literature to address this...

    Provided By The China Press Berhad

  • White Papers // Nov 2011

    Learning-Based Power Management for Multi-Core Processors via Idle Period Manipulation

    Learning-based Dynamic Power Management (DPM) techniques, being able to adapt to varying system conditions and workloads, have attracted lots of research attention recently. To the best of the authors' knowledge, however, none of the existing learning-based DPM solutions are dedicated to power reduction in multi-core processors, although they can be...

    Provided By The China Press Berhad

  • White Papers // Nov 2011

    CODA: A Concurrent Online Delay Measurement Architecture for Critical Paths

    With technology scaling, integrated circuits behave more unpredictably due to process variation, environmental changes and aging effects. Various variation-aware and adaptive design methodologies have been proposed to tackle this problem. Clearly, more effective solutions can be obtained if the authors are able to collect real-time information such as the actual...

    Provided By The China Press Berhad

  • White Papers // Aug 2011

    On the Sparsity of a Linear Network Code for Broadcast Systems with Feedback

    One method for reducing the decoding complexity of network coding in wireless broadcast systems is to generate sparse encoding vectors. The problem of finding the minimal Hamming weight of innovative encoding vectors over large finite field is formulated. By reducing the problem of hitting set to it, the authors show...

    Provided By The China Press Berhad

  • White Papers // Jul 2011

    Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration

    In a distributed storage system, the storage costs of different storage nodes, in general, can be different. How to store a file in a given set of storage nodes so as to minimize the total storage cost is investigated. By analyzing the min-cut constraints of the information flow graph, the...

    Provided By The China Press Berhad

  • White Papers // Jul 2011

    Non-Adaptive Probabilistic Group Testing With Noisy Measurements: Near-Optimal Bounds With Efficient Algorithms

    The authors consider the problem of detecting a small subset of defective items from a large set via non-adaptive "Random pooling" group tests. They consider both the case when the measurements are noiseless, and the case when the measurements are noisy (the outcome of each group test may be independently...

    Provided By The China Press Berhad

  • White Papers // Jun 2011

    Exact Minimum-Repair-Bandwidth Cooperative Regenerating Codes for Distributed Storage Systems

    In order to provide high data reliability, distributed storage systems disperse data with redundancy to multiple storage nodes. Regenerating codes is a new class of erasure codes to introduce redundancy for the purpose of improving the data repair performance in distributed storage. Most of the studies on regenerating codes focus...

    Provided By The China Press Berhad

  • White Papers // May 2011

    The Capacity Region of Classes of Product Broadcast Channels

    The authors establish a new outer bound for the capacity region of product broadcast channels. This outer bound matches Marton's inner bound for a variety of classes of product broadcast channels whose capacity regions were previously unknown. These classes include product of reversely semi-deterministic and product of reversely more-capable channels....

    Provided By The China Press Berhad

  • White Papers // May 2011

    Coding for a Network Coded Fountain

    BATched Sparse (BATS) codes are proposed for transmitting a collection of packets through communication networks employing linear network coding. BATS codes generalize fountain codes and preserve the properties such as ratelessness and low encoding/decoding complexity. Moreover, the buffer size and the computation capability of the intermediate network nodes required to...

    Provided By The China Press Berhad

  • White Papers // May 2011

    Generation of Innovative and Sparse Encoding Vectors for Broadcast Systems with Feedback

    In the application of linear network coding to wireless broadcasting with feedback, the authors prove that the problem of determining the existence of an innovative encoding vector is NP-complete when the finite field size is two. When the finite field size is larger than or equal to the number of...

    Provided By The China Press Berhad

  • White Papers // May 2011

    Feedback Enlarges Capacity Region of Two-Way Relay Channel

    The authors consider a Two-way Relay Channel (TRC) in which two terminals exchange messages with the help of a relay between them. The two terminals transmit messages to the relay through the Multiple Access Channel (MAC) and the relay transmits messages to the two terminals through the Broadcast Channel (BC)....

    Provided By The China Press Berhad

  • White Papers // Feb 2011

    On Marton's Inner Bound for Two Receiver Broadcast Channels

    In this paper, the authors considered the 2-letter sum rate of the Marton's inner bound and deduced some properties of this expression. They showed that Marton's sum rate for product of non-identical channels does not factorize and hence their focus was on a much related quantity called the -sum rate....

    Provided By The China Press Berhad

  • White Papers // Sep 2010

    Fine-Grained Characterization of Process Variation in FPGAs

    As semiconductor manufacturing continues towards reduced feature sizes, yield loss due to process variation becomes increasingly important. To address this issue on FPGA platforms, several Variation Aware Design (VAD) methodologies have been proposed. In this paper, the authors present a practical method of Process Variation Characterization (PVC) to facilitate VAD...

    Provided By The China Press Berhad

  • White Papers // Sep 2010

    An FPGA Chip Identification Generator Using Configurable Ring Oscillator

    Associating a unique IDentification (ID) string with an integrated circuit is necessary for chip identification and generation of keys in authentication systems. It has a wide range of applications including: key generation in public-key cryptographic systems; identification in smart cards; keyless entry systems; RFIDs; identifying nodes in systems and networks;...

    Provided By The China Press Berhad

  • White Papers // Aug 2010

    On Signal Tracing for Debugging Speedpath-Related Electrical Errors in Post-Silicon Validation

    One of the most challenging problems in post-silicon validation is to identify those errors that cause prohibitive extra delay on speedpaths in the Circuit Under Debug (CUD) and only expose themselves in a certain electrical environment. To address this problem, the authors propose a trace-based silicon debug solution, which provides...

    Provided By The China Press Berhad

  • White Papers // Aug 2010

    On Timing-Independent False Path Identification

    In this paper, the authors concern with finding timing-independent false paths that cannot be sensitized under any signal arrival time condition in integrated circuits. Existing techniques regard a path as a true path as long as a vector pair can be found to sensitize it. This is rather pessimistic since...

    Provided By The China Press Berhad

  • White Papers // Aug 2010

    Yield Enhancement for 3D-Stacked Memory by Redundancy Sharing Across Dies

    Three-Dimensional (3D) memory products are emerging to fulfill the ever-increasing demands of storage capacity. In 3D-stacked memory, redundancy sharing between neighboring vertical memory blocks using short Through-Silicon Vias (TSVs) is a promising solution for yield enhancement. Since different memory dies are with distinct fault bitmaps, how to selectively matching them...

    Provided By The China Press Berhad

  • White Papers // Mar 2010

    Network Coding Theory: An introduction

    For a long time, store-and-forward had been the transport mode in network communications. In other words, information had been regarded as a commodity that only needs to be routed through the network, possibly with replication at the intermediate nodes. In the late 1990's, a new concept called network coding fundamentally...

    Provided By The China Press Berhad

  • White Papers // Mar 2010

    AgeSim: A Simulation Framework for Evaluating the Lifetime Reliability of Processor-Based SoCs

    Aggressive technology scaling has an ever-increasing adverse impact on the lifetime reliability of microprocessors. This paper proposes a novel simulation framework for evaluating the lifetime reliability of processor-based System-on-Chips (SoCs), namely AgeSim, which facilitates designers to make design decisions that affect SoCs' mean time to failure. Unlike existing work, AgeSim...

    Provided By The China Press Berhad

  • White Papers // Jan 2010

    An Information Inequality for the BSSC Broadcast Channel

    The broadcast channel is a fundamental network information theory setting modeling the communication of messages (private and common) from a single sender to multiple receivers. There has been some recent progress for the discrete memoryless setting, and this work establishes a conjecture proposed in one of the recent papers. The...

    Provided By The China Press Berhad

  • White Papers // Dec 2009

    Layout-Aware Pseudo-Functional Testing for Critical Paths Considering Power Supply Noise Effects

    When testing delay faults on critical paths, conventional structural test patterns may be applied in functionally-unreachable states, leading to over-testing or under-testing of the circuits. In this paper, the authors propose novel layout-aware pseudo functional testing techniques to tackle the above problem. Firstly, by taking the circuit layout information into...

    Provided By The China Press Berhad

  • White Papers // Nov 2009

    On Signal Tracing in Post-Silicon Validation

    It is increasingly difficult to guarantee the first silicon success for complex Integrated Circuit (IC) designs. Post-silicon validation has thus become an essential step in the IC design flow. Tracing internal signals during circuit's normal operation, being able to provide real-time visibility to the Circuit Under Debug (CUD) is one...

    Provided By The China Press Berhad

  • White Papers // Aug 2009

    Test Pattern Selection for Potentially Harmful Open Defects in Power Distribution Networks

    Power Distribution Network (PDN) designs for today's high performance Integrated Circuits (ICs) typically occupy a significant share of metal resources in the circuit, and hence defects may be introduced on PDNs during the manufacturing process. Since, the authors cannot afford to over-design the PDNs to tolerate all possible defects, it...

    Provided By The China Press Berhad

  • White Papers // Jan 2009

    A Generic Framework for Scan Capture Power Reduction in Fixed-Length Symbol-Based Test Compression Environment

    Growing test data volume and over testing caused by excessive scan capture power are two of the major concerns for the industry when testing large integrated circuits. Various Test Data Compression (TDC) schemes and low-power X-filling techniques were proposed to address the above problems. These methods, however, exploit the very...

    Provided By The China Press Berhad

  • White Papers // Feb 2012

    Analog Network Coding in General SNR Regime

    The problem of maximum rate achievable with analog network coding for a unicast communication over a layered relay network with directed links is considered. A relay node performing analog network coding scales and forwards the signals received at its input. Recently this problem has been considered with two conditions: each...

    Provided By The China Press Berhad

  • White Papers // Jul 2011

    Non-Adaptive Probabilistic Group Testing With Noisy Measurements: Near-Optimal Bounds With Efficient Algorithms

    The authors consider the problem of detecting a small subset of defective items from a large set via non-adaptive "Random pooling" group tests. They consider both the case when the measurements are noiseless, and the case when the measurements are noisy (the outcome of each group test may be independently...

    Provided By The China Press Berhad

  • White Papers // Mar 2010

    Network Coding Theory: An introduction

    For a long time, store-and-forward had been the transport mode in network communications. In other words, information had been regarded as a commodity that only needs to be routed through the network, possibly with replication at the intermediate nodes. In the late 1990's, a new concept called network coding fundamentally...

    Provided By The China Press Berhad

  • White Papers // Mar 2013

    Wireless Broadcast with Physical-Layer Network Coding

    In this paper, the authors investigate the maximum broadcast throughput and its achievability in multi-hop wireless networks with half-duplex node constraint. They allow the use of Physical-layer Network Coding (PNC). Although the use of PNC for unicast has been extensively studied, to their best knowledge, there has been little, if...

    Provided By The China Press Berhad

  • White Papers // Mar 2013

    DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware

    Smartphone's are becoming prevailing devices for many people. Unfortunately, malware on Smartphone's is also increasing at an unprecedented rate. Android OS-based systems, being the most popular platform for mobile devices, have been a popular target for malware developers. As stated in, the exponential growth of mobile malware is mainly due...

    Provided By The China Press Berhad

  • White Papers // Jan 2013

    Reliable Deniable Communication: Hiding Messages in Noise

    Alice is in jail, and may wish to communicate reliably with Bob in the neighboring cell, over n uses of a noisy BSC (if she stays silent, the input to the channel is all zeroes). Unfortunately, the warden Willie is monitoring Alice (though his observations are significantly noisier, since his...

    Provided By The China Press Berhad

  • White Papers // Jan 2013

    On AVCs With Quadratic Constraints

    In this paper, the authors study an Arbitrarily Varying Channel (AVC) with quadratic power constraints on the transmitter and a so-called "Oblivious" jammer (along with additional AWGN) under a maximum probability of error criterion, and no private randomness between the transmitter and the receiver. This is in contrast to similar...

    Provided By The China Press Berhad

  • White Papers // Feb 2013

    FRANTIC: A Fast Reference-Based Algorithm for Network Tomography Via Compressive Sensing

    The authors study the problem of link and node delay estimation in undirected networks when at most k out of n links or nodes in the network is congested. Their approach relies on end-to-end measurements of path delays across pre-specified paths in the network. They present a class of algorithms...

    Provided By The China Press Berhad

  • White Papers // Feb 2012

    Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers

    Energy consumption represents a significant cost in data center operation. A large fraction of the energy, however, is used to power idle servers when the workload is low. Dynamic provisioning techniques aim at saving this portion of the energy, by turning off unnecessary servers. In this paper, the authors explore...

    Provided By The China Press Berhad

  • White Papers // Feb 2011

    On Marton's Inner Bound for Two Receiver Broadcast Channels

    In this paper, the authors considered the 2-letter sum rate of the Marton's inner bound and deduced some properties of this expression. They showed that Marton's sum rate for product of non-identical channels does not factorize and hence their focus was on a much related quantity called the -sum rate....

    Provided By The China Press Berhad

  • White Papers // May 2011

    The Capacity Region of Classes of Product Broadcast Channels

    The authors establish a new outer bound for the capacity region of product broadcast channels. This outer bound matches Marton's inner bound for a variety of classes of product broadcast channels whose capacity regions were previously unknown. These classes include product of reversely semi-deterministic and product of reversely more-capable channels....

    Provided By The China Press Berhad

  • White Papers // Sep 2008

    Variable-Rate Linear Network Coding

    Network coding, first studied by Yeung and Zhang and Ahlswede et al., reveals that if coding is applied at the nodes in a network, rather than routing alone, the network capacity can be increased. Li et al. and subsequently Koetter and Medard proved that linear network coding is sufficient to...

    Provided By The China Press Berhad

  • White Papers // May 2011

    Generation of Innovative and Sparse Encoding Vectors for Broadcast Systems with Feedback

    In the application of linear network coding to wireless broadcasting with feedback, the authors prove that the problem of determining the existence of an innovative encoding vector is NP-complete when the finite field size is two. When the finite field size is larger than or equal to the number of...

    Provided By The China Press Berhad

  • White Papers // May 2011

    Coding for a Network Coded Fountain

    BATched Sparse (BATS) codes are proposed for transmitting a collection of packets through communication networks employing linear network coding. BATS codes generalize fountain codes and preserve the properties such as ratelessness and low encoding/decoding complexity. Moreover, the buffer size and the computation capability of the intermediate network nodes required to...

    Provided By The China Press Berhad

  • White Papers // Aug 2011

    On the Sparsity of a Linear Network Code for Broadcast Systems with Feedback

    One method for reducing the decoding complexity of network coding in wireless broadcast systems is to generate sparse encoding vectors. The problem of finding the minimal Hamming weight of innovative encoding vectors over large finite field is formulated. By reducing the problem of hitting set to it, the authors show...

    Provided By The China Press Berhad

  • White Papers // May 2011

    Feedback Enlarges Capacity Region of Two-Way Relay Channel

    The authors consider a Two-way Relay Channel (TRC) in which two terminals exchange messages with the help of a relay between them. The two terminals transmit messages to the relay through the Multiple Access Channel (MAC) and the relay transmits messages to the two terminals through the Broadcast Channel (BC)....

    Provided By The China Press Berhad

  • White Papers // Feb 2012

    Linear Network Code for Erasure Broadcast Channel with Feedback: Complexity and Algorithms

    In this paper, the authors investigate the construction of linear network codes for broadcasting a set of data packets to a number of users. The links from the source to the users are modeled as independent erasure channels. Users are allowed to inform the source node whether a packet is...

    Provided By The China Press Berhad

  • White Papers // Jan 2010

    An Information Inequality for the BSSC Broadcast Channel

    The broadcast channel is a fundamental network information theory setting modeling the communication of messages (private and common) from a single sender to multiple receivers. There has been some recent progress for the discrete memoryless setting, and this work establishes a conjecture proposed in one of the recent papers. The...

    Provided By The China Press Berhad

  • White Papers // Jan 2013

    Database-Assisted Distributed Spectrum Sharing

    According to FCC's ruling for white-space spectrum access, white-space devices are required to query a database to determine the spectrum availability. In this paper, the authors study the database-assisted distributed whitespace Access Point (AP) network design. They first model the cooperative and non-cooperative channel selection problems among the APs as...

    Provided By The China Press Berhad

  • White Papers // Sep 2006

    Answering XML Queries Using Indexes

    The problem of answering XML queries using indexes is to find efficient methods for accelerating the XML query with pre-designed index structures over the XML database. This problem received increasing interests and has been lucubrated in recent years. Regular path expression is the core of the XML query languages e.g.,...

    Provided By The China Press Berhad

  • White Papers // Jan 2014

    Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-coded Clustered Storage

    Many modern storage systems adopt erasure coding to provide data availability guarantees with low redundancy. Log-based storage is often used to append new data rather than overwrite existing data so as to achieve high update efficiency, but introduces significant I/O overhead during recovery due to reassembling updates from data and...

    Provided By The China Press Berhad

  • White Papers // Jan 2014

    STAIR Codes: A General Family of Erasure Codes for Tolerating Device and Sector Failures in Practical Storage Systems

    Practical storage systems often adopt erasure codes to tolerate device failures and sector failures, both of which are prevalent in the field. However, traditional erasure codes employ device-level redundancy to protect against sector failures, and hence incur significant space overhead. Recent Sector-Disk (SD) codes are available only for limited configurations...

    Provided By The China Press Berhad

  • White Papers // Jul 2013

    Stochastic Analysis on RAID Reliability for Solid-State Drives

    Solid-State drives (SSDs) have been widely deployed in desktops and data centers. However, SSDs suffer from bit errors, and the bit error rate is time dependent since it increases as an SSD wears down. Traditional storage systems mainly use parity-based RAID to provide reliability guarantees by striping redundancy across multiple...

    Provided By The China Press Berhad

  • White Papers // May 2013

    Symmetry in Distributed Storage Systems

    The max-flow outer bound is achievable by regenerating codes for functional repair distributed storage system. However, the capacity of exact repair distributed storage system is an open problem. In this paper, the linear programming bound for exact repair distributed storage systems is formulated. A notion of symmetrical sets for a...

    Provided By The China Press Berhad

  • White Papers // Jun 2011

    Exact Minimum-Repair-Bandwidth Cooperative Regenerating Codes for Distributed Storage Systems

    In order to provide high data reliability, distributed storage systems disperse data with redundancy to multiple storage nodes. Regenerating codes is a new class of erasure codes to introduce redundancy for the purpose of improving the data repair performance in distributed storage. Most of the studies on regenerating codes focus...

    Provided By The China Press Berhad

  • White Papers // Jul 2011

    Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration

    In a distributed storage system, the storage costs of different storage nodes, in general, can be different. How to store a file in a given set of storage nodes so as to minimize the total storage cost is investigated. By analyzing the min-cut constraints of the information flow graph, the...

    Provided By The China Press Berhad

  • White Papers // Sep 2008

    On Modeling the Lifetime Reliability of Homogeneous Manycore Systems

    While the relentless scaling of CMOS technology has brought with it enhanced functionality and improved performance in every new generation, the associated ever-increasing on-chip power and temperature densities make the lifetime reliability of high-performance Integrated Circuits (ICs) one of the major concerns for the industry. Advancements in technology enable integration...

    Provided By The China Press Berhad

  • White Papers // Mar 2010

    AgeSim: A Simulation Framework for Evaluating the Lifetime Reliability of Processor-Based SoCs

    Aggressive technology scaling has an ever-increasing adverse impact on the lifetime reliability of microprocessors. This paper proposes a novel simulation framework for evaluating the lifetime reliability of processor-based System-on-Chips (SoCs), namely AgeSim, which facilitates designers to make design decisions that affect SoCs' mean time to failure. Unlike existing work, AgeSim...

    Provided By The China Press Berhad

  • White Papers // Mar 2006

    Retention-Aware Test Scheduling for BISTed Embedded SRAMs

    In this paper, the authors address the test scheduling problem for BuIltin Self-Tested (BISTed) embedded SRAMs (e-SRAMs) when Data Retention Faults (DRFs) are considered. The proposed test scheduling algorithm utilizes the \"Retention-aware\" test power model to minimize the total testing time of e-SRAMs while not violating given power constraints. Without...

    Provided By The China Press Berhad

  • White Papers // Sep 2006

    Test/Repair Area Overhead Reduction for Small Embedded SRAMs

    For current highly-integrated and memory-dominant System-on-Chips (SoCs), especially for graphics and networking SoCs, the test/repair area overhead of embedded SRAMs (e-SRAMs) is a big concern. This paper presents various approaches to tackle this problem from a practical point of view. Without sacrificing at-speed testability, diagnosis capability and repairability, the proposed...

    Provided By The China Press Berhad

  • White Papers // Dec 2007

    In-Band Cross-Trigger Event Transmission for Transaction-Based Debug

    Cross-trigger, the mechanism to trigger activities in one debug entity from debug events happened in another debug entity, is a very useful technique for debugging applications involving multiple embedded cores. Existing solutions rely on dedicated interconnects (i.e., different from functional interconnects) to transfer debug events and cannot guarantee the arrival...

    Provided By The China Press Berhad

  • White Papers // Aug 2008

    On Reusing Test Access Mechanisms for Debug Data Transfer in SoC Post-Silicon Validation

    One of the main difficulties in post-silicon validation is the limited debug access bandwidth to internal signals. At the same time, SoC devices often contain dedicated bus-based Test Access Mechanisms (TAMs) that are used to transfer test data between external testers and embedded cores. In this paper, the authors propose...

    Provided By The China Press Berhad

  • White Papers // Nov 2007

    A Debug Probe for Concurrently Debugging Multiple Embedded Cores and Inter-Core Transactions in NoC-Based Systems

    Existing SoC debug techniques mainly target bus-based systems. They are not readily applicable to the emerging system that uses Network-on-Chip (NoC) as on-chip communication scheme. In this paper, the authors present the detailed design of a novel Debug Probe (DP) inserted between the Core Under Debug (CUD) and the NoC....

    Provided By The China Press Berhad

  • White Papers // Aug 2009

    Test Pattern Selection for Potentially Harmful Open Defects in Power Distribution Networks

    Power Distribution Network (PDN) designs for today's high performance Integrated Circuits (ICs) typically occupy a significant share of metal resources in the circuit, and hence defects may be introduced on PDNs during the manufacturing process. Since, the authors cannot afford to over-design the PDNs to tolerate all possible defects, it...

    Provided By The China Press Berhad

  • White Papers // Nov 2009

    On Signal Tracing in Post-Silicon Validation

    It is increasingly difficult to guarantee the first silicon success for complex Integrated Circuit (IC) designs. Post-silicon validation has thus become an essential step in the IC design flow. Tracing internal signals during circuit's normal operation, being able to provide real-time visibility to the Circuit Under Debug (CUD) is one...

    Provided By The China Press Berhad

  • White Papers // Jan 2009

    A Generic Framework for Scan Capture Power Reduction in Fixed-Length Symbol-Based Test Compression Environment

    Growing test data volume and over testing caused by excessive scan capture power are two of the major concerns for the industry when testing large integrated circuits. Various Test Data Compression (TDC) schemes and low-power X-filling techniques were proposed to address the above problems. These methods, however, exploit the very...

    Provided By The China Press Berhad

  • White Papers // Jan 2009

    Trace Signal Selection for Visibility Enhancement in Post-Silicon Validation

    Today's complex integrated circuit designs increasingly rely on post-silicon validation to eliminate bugs that escape from pre-silicon verification. One effective silicon debug technique is to monitor and trace the behaviors of the circuit during its normal operation. However, designers can only afford to trace a small number of signals in...

    Provided By The China Press Berhad

  • White Papers // Aug 2010

    On Signal Tracing for Debugging Speedpath-Related Electrical Errors in Post-Silicon Validation

    One of the most challenging problems in post-silicon validation is to identify those errors that cause prohibitive extra delay on speedpaths in the Circuit Under Debug (CUD) and only expose themselves in a certain electrical environment. To address this problem, the authors propose a trace-based silicon debug solution, which provides...

    Provided By The China Press Berhad

  • White Papers // Sep 2010

    An FPGA Chip Identification Generator Using Configurable Ring Oscillator

    Associating a unique IDentification (ID) string with an integrated circuit is necessary for chip identification and generation of keys in authentication systems. It has a wide range of applications including: key generation in public-key cryptographic systems; identification in smart cards; keyless entry systems; RFIDs; identifying nodes in systems and networks;...

    Provided By The China Press Berhad

  • White Papers // Sep 2010

    Fine-Grained Characterization of Process Variation in FPGAs

    As semiconductor manufacturing continues towards reduced feature sizes, yield loss due to process variation becomes increasingly important. To address this issue on FPGA platforms, several Variation Aware Design (VAD) methodologies have been proposed. In this paper, the authors present a practical method of Process Variation Characterization (PVC) to facilitate VAD...

    Provided By The China Press Berhad