Results 51 to 60 of about 9,109,748 (351)

CVA6 RISC-V Virtualization: Architecture, Microarchitecture, and Design Space Exploration [PDF]

open access: yesIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023
Virtualization is a key technology used in a wide range of applications, from cloud computing to embedded systems. Over the last few years, mainstream computer architectures were extended with hardware virtualization support, giving rise to a set of ...
Bruno Sá   +5 more
semanticscholar   +1 more source

Security, Reliability and Test Aspects of the RISC-V Ecosystem [PDF]

open access: yes2021 IEEE European Test Symposium (ETS), 2021
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardware for safety-critical applications, we need a deep understanding of the way in which well established mechanisms for testing and reliability could be integrated and deployed on the RISCV ecosystem, and we need a clear knowledge on how such an ecosystem ...
Abella Ferrer, Jaume   +15 more
openaire   +5 more sources

LIRA-V:Lightweight Remote Attestation for Constrained RISC-V Devices [PDF]

open access: yes, 2021
This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture. We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust ...
Jaloyan, Georges-Axel   +2 more
core   +2 more sources

Siracusa: A 16 nm Heterogenous RISC-V SoC for Extended Reality With At-MRAM Neural Engine [PDF]

open access: yesIEEE Journal of Solid-State Circuits, 2023
Extended reality (XR) applications are machine learning (ML)-intensive, featuring deep neural networks (DNNs) with millions of weights, tightly latency-bound (10–20 ms end-to-end), and power-constrained (low tens of mW average power).
A. Prasad   +11 more
semanticscholar   +1 more source

Hybrid Modular Redundancy: Exploring Modular Redundancy Approaches in RISC-V Multi-core Computing Clusters for Reliable Processing in Space [PDF]

open access: yesACM Trans. Cyber Phys. Syst., 2023
Space Cyber-Physical Systems such as spacecraft and satellites strongly rely on the reliability of onboard computers to guarantee the success of their missions.
M. Rogenmoser   +4 more
semanticscholar   +1 more source

An ultra-low-power processor pipeline-structure

open access: yesDianzi Jishu Yingyong, 2019
With the rapid development of communication and chip technology, IoT will be an important part of the next generation of information technology, a powerful driving force to promote the intelligent process of our lives. Among the IoT terminal applications,
Deng Tianchuan, Hu Zhenbo
doaj   +1 more source

DEMIX: Domain-Enforced Memory Isolation for Embedded System

open access: yesSensors, 2023
Memory isolation is an essential technology for safeguarding the resources of lightweight embedded systems. This technique isolates system resources by constraining the scope of the processor’s accessible memory into distinct units known as domains ...
Haeyoung Kim   +4 more
doaj   +1 more source

Software Development Vehicles to enable extended and early co-design: a RISC-V and HPC case of study [PDF]

open access: yesISC Workshops, 2023
Prototyping HPC systems with low-to-mid technology readiness level (TRL) systems is critical for providing feedback to hardware designers, the system software team (e.g., compiler developers), and early adopters from the scientific community. The typical
F. Mantovani   +8 more
semanticscholar   +1 more source

ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

open access: yesCryptography, 2022
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano   +4 more
doaj   +1 more source

BRISC-V emulator: a standalone, installation-free, browser-based teaching tool [PDF]

open access: yes, 2020
Many computer organization and computer architecture classes have recently started adopting the RISC-V architecture as an alternative to proprietary RISC ISAs and architectures.
Isakov, Mihailo, Kinsy, Michel A.
core  

Home - About - Disclaimer - Privacy