by Jung Ho Ahn on Apr 28, 2022 | Tags: Bootstrapping, Emerging Application, Homomorphic Encryption, Privacy-preserving Computing
Homomorphic encryption (HE) is an emerging, computationally intensive application for computer architects. HE allows computations on encrypted data (called ciphertexts). In the machine-learning-as-a-service era, HE is highlighted as an enabler for privacy-preserving...
Read more...
by Elaheh Sadredini and Daniel Wong on Apr 18, 2022 | Tags: Conference, Virtual Meetings
Welcome to the trip report on the 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA-28)! This marks the second fully-virtual HPCA (and hopefully last). With signs of the COVID-19 pandemic receding last November 2021, HPCA decided to...
Read more...
by Xiangyao Yu on Apr 13, 2022 | Tags: Cloud computing, Databases, Datacenters, Emerging Technology, Memory Disaggregation, Near Data Computing, Storage
The memory and storage hierarchy deepens in modern systems. To mitigate the low performance of memory/storage devices at the bottom of the hierarchy, near-data processing has been studied across different memory and storage devices as a means to reduce access latency...
Read more...
by Elba Garza and Abdulrahman Mahmoud on Apr 7, 2022 | Tags: ASPLOS, Conference, Conferences
Early this March, computer and systems architects from the world over gathered in Lausanne, Switzerland to attend the 27th International Conference on Architectural Support for Programming Languages and Operating Systems, or ASPLOS 2022. The first conference to go...
Read more...
by Vijay Chidambaram on Apr 4, 2022 | Tags: Conference, rebuttal, Review, Reviewing
Many CS systems and architecture conferences have a rebuttal phase or an author response period, where authors can respond to the questions asked by reviewers, and correct misunderstandings by reviewers. We discuss the pros and cons of this phase, and whether it is a...
Read more...
by Hung-Wei Tseng on Mar 9, 2022 | Tags: Accelerators, Machine Learning, ray tracing, Specialization, Tensor Processing
With Dennard scaling discontinued, application-specific hardware accelerators are ubiquitous in modern computers to offer more efficient task processing. Famous examples include Google’s Tensor Processing Units (TPUs) and Apple’s Neural Engines for...
Read more...
by Dmitry Ponomarev on Feb 17, 2022 | Tags: Conferences, fhe, hardware accelerator, Security
In an earlier blog post, we summarized advances in hardware and architecture security research in the early part of 2021; this post highlights contributions that appeared in the later part of 2021 that are of interest to our community. In this post, we focus on papers...
Read more...
by Rajeev Balasubramonian and Christina Delimitrou on Feb 3, 2022 | Tags: ACM SIGARCH, Blog
Another year in the books. Another year of dealing with the impact of Covid. Nearly everyone has been touched by the pandemic, and it’s worthwhile to remember this impact and be extra kind and understanding with our colleagues. While university campus life has...
Read more...
by Yuhao Zhu on Jan 27, 2022 | Tags: 3D Stacking, Computer Vision, Image Sensors
Some of the most exciting applications on the horizon such as autonomous machines, Augmented/Virtual Reality, space exploration, and precision medicine rely on image sensing — at different scales. While conventional CMOS image sensors are responsible for only...
Read more...
by Richard L. Sites on Jan 25, 2022 | Tags: Measurements, Performance, Performance Counters, Processors, System Analysis
Part 1 of this article discussed a reliable elapsed-time counter design. This Part 2 discusses the four counters needed to make sense of unexpectedly slow execution: total issue slots, issue slots filled with instructions, filled issue slots that actually issue, and...
Read more...