Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…
Architectures -- Extra-dimensional Island-Style FPGAs -- A Tightly Coupled VLIW/Reconfigurable Matrix and its Modulo Scheduling Technique -- Stream-based XPP Architectures in Adaptive System-on-Chip Integration -- Core-Based Architecture for Data Transfer Control in SoC Design -- Customizable and Reduced Hardware Motion Estimation Processors -- Methodologies and Tools -- Enabling Run-time Task …
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
Model Taxonomy -- Functional Verification Taxonomy -- Platform-Based Design -- Hardware-Dependent Software."In the complicated world of system-on-chip design, we need a common language so we know what we're talking about. By providing definitions for the terms used in the modeling, implementation, and verification of electronic systems, the taxonomies described in this book will help us find a …
Invited Talks -- Randomized Algorithms for Program Analysis and Verification -- Validating a Modern Microprocessor -- Algorithmic Algebraic Model Checking I: Challenges from Systems Biology -- Tools Competition -- SMT-COMP: Satisfiability Modulo Theories Competition -- Abstraction and Refinement -- Predicate Abstraction via Symbolic Decision Procedures -- Interpolant-Based Transition Relation A…
Keynote Address I -- Processor Architecture for Trustworthy Computers -- Session 1A: Energy Efficient and Power Aware Techniques -- Efficient Voltage Scheduling and Energy-Aware Co-synthesis for Real-Time Embedded Systems -- Energy-Effective Instruction Fetch Unit for Wide Issue Processors -- Rule-Based Power-Balanced VLIW Instruction Scheduling with Uncertainty -- An Innovative Instruction Cac…
Prologue -- Generalizing Proofs-as-Programs -- Functional Program Synthesis -- The Curry-Howard Protocol -- Imperative Proofs-as-Programs -- Intuitionistic Hoare Logic -- Properties of Intuitionistic Hoare Logic -- Proofs-as-Imperative-Programs -- Structured Proofs-as-Programs -- Reasoning about Structured Specifications -- Proof-theoretic Properties of SSL -- Structured Proofs-as-Programs -- G…
Fault Tolerance and Recovery -- An Adaptive Self-tolerant Algorithm for Hardware Immune System -- Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration -- Hardware Fault-Tolerance Within the POEtic System -- Evolvable Hardware System at Extreme Low Temperatures -- Platforms for Evolving Digital Systems -- Intrinsic Evolution of Sorting Networks: A Novel Complete H…
Parallel Job Scheduling — A Status Report -- Scheduling on the Top 50 Machines -- Parallel Computer Workload Modeling with Markov Chains -- Enhancements to the Decision Process of the Self-Tuning dynP Scheduler -- Reconfigurable Gang Scheduling Algorithm -- Time-Critical Scheduling on a Well Utilised HPC System at ECMWF Using Loadleveler with Resource Reservation -- Inferring the Topology and…
Invited Program -- Keynote 1: Using EEMBC Benchmarks to Understand Processor Behavior in Embedded Applications -- Keynote 2: The Chip-Multiprocessing Paradigm Shift: Opportunities and Challenges -- Software Defined Radio – A High Performance Embedded Challenge -- I Analysis and Evaluation Techniques -- A Practical Method for Quickly Evaluating Program Optimizations -- Efficient Sampling Start…