Thread
Stories related to "A week with the Surface Pro X" across the full archive.
Busting 4 Modern Hardware Myths - Are Memory, HDDs, and SSDs Really Random Access?
(highscalability.com)
After an intro to formal methods, it describes examples of hardware, software, and combined verifications of useful protection schemes. Recent work focuses more on HW/SW combined since it provides highest usability, security, and performance combination.
A Stall-Free, Real-Time, Garbage Collector for Reconfigurable Hardware (2012)
(researcher.watson.ibm.com)
Verification of a Practical Hardware Security Architecture via Static Information Flow Analysis
(cse.psu.edu)
Abstract: "Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementing these mechanisms correctly has proved difficult, undermining the root of security. This work introduces an effective way to formally verify important properties of such hardware security m...
Programmatic Control of a Compiler for Generating High-Performance, Spatial Hardware (2017)
(arxiv.org)
Abstract: "This methodology paper addresses high-performance highproductivity programming on spatial architectures. Spatial architectures are efficient for executing dataflow algorithms,
yet for high-performance programming, the productivity is low and verification is painful.
We show that coding ...