415 research outputs found

    Resource-aware scheduling for 2D/3D multi-/many-core processor-memory systems

    Get PDF
    This dissertation addresses the complexities of 2D/3D multi-/many-core processor-memory systems, focusing on two key areas: enhancing timing predictability in real-time multi-core processors and optimizing performance within thermal constraints. The integration of an increasing number of transistors into compact chip designs, while boosting computational capacity, presents challenges in resource contention and thermal management. The first part of the thesis improves timing predictability. We enhance shared cache interference analysis for set-associative caches, advancing the calculation of Worst-Case Execution Time (WCET). This development enables accurate assessment of cache interference and the effectiveness of partitioned schedulers in real-world scenarios. We introduce TCPS, a novel task and cache-aware partitioned scheduler that optimizes cache partitioning based on task-specific WCET sensitivity, leading to improved schedulability and predictability. Our research explores various cache and scheduling configurations, providing insights into their performance trade-offs. The second part focuses on thermal management in 2D/3D many-core systems. Recognizing the limitations of Dynamic Voltage and Frequency Scaling (DVFS) in S-NUCA many-core processors, we propose synchronous thread migrations as a thermal management strategy. This approach culminates in the HotPotato scheduler, which balances performance and thermal safety. We also introduce 3D-TTP, a transient temperature-aware power budgeting strategy for 3D-stacked systems, reducing the need for Dynamic Thermal Management (DTM) activation. Finally, we present 3QUTM, a novel method for 3D-stacked systems that combines core DVFS and memory bank Low Power Modes with a learning algorithm, optimizing response times within thermal limits. This research contributes significantly to enhancing performance and thermal management in advanced processor-memory systems

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    Durability and Availability of Erasure-Coded Storage Systems with Concurrent Maintenance

    Full text link
    This initial version of this document was written back in 2014 for the sole purpose of providing fundamentals of reliability theory as well as to identify the theoretical types of machinery for the prediction of durability/availability of erasure-coded storage systems. Since the definition of a "system" is too broad, we specifically focus on warm/cold storage systems where the data is stored in a distributed fashion across different storage units with or without continuous operation. The contents of this document are dedicated to a review of fundamentals, a few major improved stochastic models, and several contributions of my work relevant to the field. One of the contributions of this document is the introduction of the most general form of Markov models for the estimation of mean time to failure. This work was partially later published in IEEE Transactions on Reliability. Very good approximations for the closed-form solutions for this general model are also investigated. Various storage configurations under different policies are compared using such advanced models. Later in a subsequent chapter, we have also considered multi-dimensional Markov models to address detached drive-medium combinations such as those found in optical disk and tape storage systems. It is not hard to anticipate such a system structure would most likely be part of future DNA storage libraries. This work is partially published in Elsevier Reliability and System Safety. Topics that include simulation modelings for more accurate estimations are included towards the end of the document by noting the deficiencies of the simplified canonical as well as more complex Markov models, due mainly to the stationary and static nature of Markovinity. Throughout the document, we shall focus on concurrently maintained systems although the discussions will only slightly change for the systems repaired one device at a time.Comment: 58 pages, 20 figures, 9 tables. arXiv admin note: substantial text overlap with arXiv:1911.0032

    Inkjet printing digital image generation and compensation for surface chemistry effects

    Get PDF
    Additive manufacturing (AM) of electronic materials using digital inkjet printing (DIJP) is of research interests nowadays because of its potential benefits in the semiconductor industry. Current trends in manufacturing electronics feature DIJP as a key technology to enable the production of customised and microscale functional devices. However, the fabrication of microelectronic components at large scale demands fast printing of tight features with high dimensional accuracy on substrates with varied surface topography which push inkjet printing process to its limits. To understand the DIJP droplet deposition on such substrates, generally requires computational fluid dynamics modelling which is limited in its physics approximation of surface interactions. Otherwise, a kind of “trial and error” approach to determining how the ink spreads, coalesce and solidifies over the substrate is used, often a very time-consuming process. Consequently, this thesis aims to develop new modelling techniques to predict fast and accurately the surface morphology of inkjet-printed features, enabling the optimisation of DIJP control parameters and the compensation of images for better dimensional accuracy of printed electronics devices. This investigation explored three categories of modelling techniques to predict the surface morphology of inkjet-printed features: physics-based, data-driven and hybrid physics-based and data-driven. Two physics-based numerical models were developed to reproduce the inkjet printing droplet deposition and solidification processes using a lattice Boltzmann (LB) multiphase flow model and a finite element (FE) chemo-mechanical model, respectively. The LB model was limited to the simulation of single tracks and small square films and the FE model was mainly employed for the distortion prediction of multilayer objects. Alternatively, two data-driven models were implemented to reconstruct the surface morphology of single tracks and free-form films using images from experiments: image analysis (IA) and shape from shading (SFS). IA assumed volume conservation and minimal energy drop shape to reconstruct the surface while SFS resolved the height of the image using a reflection model. Finally, a hybrid physics-based and data-driven approach was generated which incorporates the uncertainty of droplet landing position and footprint, hydrostatic analytical models, empirical correlations derived from experiments, and relationships derived from physics-based models to predict fast and accurately any free-form layer pattern as a function of physical properties, printing parameters and wetting characteristics. Depending on the selection of the modelling technique to predict the deformed geometry, further considerations were required. For the purely physics-based and data-driven models, a surrogate model using response surface equations was employed to create a transfer function between printing parameters, substrate wetting characteristics and the resulting surface morphology. The development of a transfer function significantly decreased the computational time required by purely physics-based models and enabled the parameter optimisation using a multi-objective genetic algorithm approach to attain the best film dimensional accuracy. Additionally, for multilayer printing applications, a layer compensation approach was achieved utilizing a convolutional neural network trained by the predicted (deformed) geometry to reduce the out of plane error to target shape. The optimal combination of printing parameters and input image compensation helped with the generation of fine features that are traditionally difficult for inkjet, improved resolution of edges and corners by reducing the amount of overflow from material, accounted for varied topography and capillary effects thereof on the substrate surface and considered the effect of multiple layers built up on each other. This study revealed for the first time to the best of our knowledge the role of the droplet location and footprint diameter uncertainty in the stability and uniformity of printed features. Using a droplet overlap map which was proposed as a universal technique to assess the effect of printing parameters on pattern geometry, it was shown that reliable limits for break-up and bulging of printed features were obtained. Considering droplet position and diameter size uncertainties, predicted optimal printing parameters improved the quality of printed films on substrates with different wettability. Finally, a stability diagram illustrating the onset of bulging and separation for lines and films as well as the optimal drop spacing, printing frequency and stand-off distance was generated to inform visually the results. This investigation has developed a predictive physics-based model of the surface morphology of DIJP features on heterogeneous substrates and a methodology to find the printing parameters and compensate the layer geometry required for optimum part dimensional accuracy. The simplicity of the proposed technique makes it a promising tool for model driven inkjet printing process optimization, including real time process control and paves the way for better quality devices in the printed electronics industry

    AI for time-resolved imaging: from fluorescence lifetime to single-pixel time of flight

    Get PDF
    Time-resolved imaging is a field of optics which measures the arrival time of light on the camera. This thesis looks at two time-resolved imaging modalities: fluorescence lifetime imaging and time-of-flight measurement for depth imaging and ranging. Both of these applications require temporal accuracy on the order of pico- or nanosecond (10−12 − 10−9s) scales. This demands special camera technology and optics that can sample light-intensity extremely quickly, much faster than an ordinary video camera. However, such detectors can be very expensive compared to regular cameras while offering lower image quality. Further, information of interest is often hidden (encoded) in the raw temporal data. Therefore, computational imaging algorithms are used to enhance, analyse and extract information from time-resolved images. "A picture is worth a thousand words". This describes a fundamental blessing and curse of image analysis: images contain extreme amounts of data. Consequently, it is very difficult to design algorithms that encompass all the possible pixel permutations and combinations that can encode this information. Fortunately, the rise of AI and machine learning (ML) allow us to instead create algorithms in a data-driven way. This thesis demonstrates the application of ML to time-resolved imaging tasks, ranging from parameter estimation in noisy data and decoding of overlapping information, through super-resolution, to inferring 3D information from 1D (temporal) data

    LIPIcs, Volume 261, ICALP 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 261, ICALP 2023, Complete Volum

    Alternative Water Supply Systems

    Get PDF
    This is the final version. Available on open access from IWA Publishing via the DOI in this recordOwing to climate change related uncertainties and anticipated population growth, different parts of the developing and the developed world (particularly urban areas) are experiencing water shortages or flooding and security of fit-for-purpose supplies is becoming a major issue. The emphasis on decentralized alternative water supply systems has increased considerably. Most of the information on such systems is either scattered or focuses on large scale reuse with little consideration given to decentralized small to medium scale systems. Alternative Water Supply Systems brings together recent research into the available and innovative options and additionally shares experiences from a wide range of contexts from both developed and developing countries. Alternative Water Supply Systems covers technical, social, financial and institutional aspects associated with decentralized alternative water supply systems. These include systems for greywater recycling, rainwater harvesting, recovery of water through condensation and sewer mining. A number of case studies from the UK, the USA, Australia and the developing world are presented to discuss associated environmental and health implications. The book provides insights into a range of aspects associated with alternative water supply systems and an evidence base (through case studies) on potential water savings and trade-offs. The information organized in the book is aimed at facilitating wider uptake of context specific alternatives at a decentralized scale mainly in urban areas. This book is a key reference for postgraduate level students and researchers interested in environmental engineering, water resources management, urban planning and resource efficiency, water demand management, building service engineering and sustainable architecture. It provides practical insights for water professionals such as systems designers, operators, and decision makers responsible for planning and delivering sustainable water management in urban areas through the implementation of decentralized water recycling

    Pushing the Boundaries of Spacecraft Autonomy and Resilience with a Custom Software Framework and Onboard Digital Twin

    Get PDF
    This research addresses the high CubeSat mission failure rates caused by inadequate software and overreliance on ground control. By applying a reliable design methodology to flight software development and developing an onboard digital twin platform with fault prediction capabilities, this study provides a solution to increase satellite resilience and autonomy, thus reducing the risk of mission failure. These findings have implications for spacecraft of all sizes, paving the way for more resilient space missions

    Specificity of the innate immune responses to different classes of non-tuberculous mycobacteria

    Get PDF
    Mycobacterium avium is the most common nontuberculous mycobacterium (NTM) species causing infectious disease. Here, we characterized a M. avium infection model in zebrafish larvae, and compared it to M. marinum infection, a model of tuberculosis. M. avium bacteria are efficiently phagocytosed and frequently induce granuloma-like structures in zebrafish larvae. Although macrophages can respond to both mycobacterial infections, their migration speed is faster in infections caused by M. marinum. Tlr2 is conservatively involved in most aspects of the defense against both mycobacterial infections. However, Tlr2 has a function in the migration speed of macrophages and neutrophils to infection sites with M. marinum that is not observed with M. avium. Using RNAseq analysis, we found a distinct transcriptome response in cytokine-cytokine receptor interaction for M. avium and M. marinum infection. In addition, we found differences in gene expression in metabolic pathways, phagosome formation, matrix remodeling, and apoptosis in response to these mycobacterial infections. In conclusion, we characterized a new M. avium infection model in zebrafish that can be further used in studying pathological mechanisms for NTM-caused diseases

    Flexible Hardware-based Security-aware Mechanisms and Architectures

    Get PDF
    For decades, software security has been the primary focus in securing our computing platforms. Hardware was always assumed trusted, and inherently served as the foundation, and thus the root of trust, of our systems. This has been further leveraged in developing hardware-based dedicated security extensions and architectures to protect software from attacks exploiting software vulnerabilities such as memory corruption. However, the recent outbreak of microarchitectural attacks has shaken these long-established trust assumptions in hardware entirely, thereby threatening the security of all of our computing platforms and bringing hardware and microarchitectural security under scrutiny. These attacks have undeniably revealed the grave consequences of hardware/microarchitecture security flaws to the entire platform security, and how they can even subvert the security guarantees promised by dedicated security architectures. Furthermore, they shed light on the sophisticated challenges particular to hardware/microarchitectural security; it is more critical (and more challenging) to extensively analyze the hardware for security flaws prior to production, since hardware, unlike software, cannot be patched/updated once fabricated. Hardware cannot reliably serve as the root of trust anymore, unless we develop and adopt new design paradigms where security is proactively addressed and scrutinized across the full stack of our computing platforms, at all hardware design and implementation layers. Furthermore, novel flexible security-aware design mechanisms are required to be incorporated in processor microarchitecture and hardware-assisted security architectures, that can practically address the inherent conflict between performance and security by allowing that the trade-off is configured to adapt to the desired requirements. In this thesis, we investigate the prospects and implications at the intersection of hardware and security that emerge across the full stack of our computing platforms and System-on-Chips (SoCs). On one front, we investigate how we can leverage hardware and its advantages, in contrast to software, to build more efficient and effective security extensions that serve security architectures, e.g., by providing execution attestation and enforcement, to protect the software from attacks exploiting software vulnerabilities. We further propose that they are microarchitecturally configured at runtime to provide different types of security services, thus adapting flexibly to different deployment requirements. On another front, we investigate how we can protect these hardware-assisted security architectures and extensions themselves from microarchitectural and software attacks that exploit design flaws that originate in the hardware, e.g., insecure resource sharing in SoCs. More particularly, we focus in this thesis on cache-based side-channel attacks, where we propose sophisticated cache designs, that fundamentally mitigate these attacks, while still preserving performance by enabling that the performance security trade-off is configured by design. We also investigate how these can be incorporated into flexible and customizable security architectures, thus complementing them to further support a wide spectrum of emerging applications with different performance/security requirements. Lastly, we inspect our computing platforms further beneath the design layer, by scrutinizing how the actual implementation of these mechanisms is yet another potential attack surface. We explore how the security of hardware designs and implementations is currently analyzed prior to fabrication, while shedding light on how state-of-the-art hardware security analysis techniques are fundamentally limited, and the potential for improved and scalable approaches
    corecore