This chapter explores the possibility of using heterogeneous chip multiprocessors (CMPs) for network and system security. It proposes an integer linear programming (ILP)-based methodology to mathematically analyze and provide heterogeneous CMP architectures and task distributions that can reduce the energy consumption of the system. It compares heterogeneous CMPs with homogeneous counterparts and provides experimental evaluation of using both on network security systems. The details of heterogeneous NoC (network-on-chip)-based CMP architecture are discussed in detail. The chapter also discusses the heterogeneous CMP-based network security processor design and advantages. It summarizes the related work on heterogeneous processors in general ...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
THIS WORK COMPARES AND ANALYZES ARCHITECTURAL CHARACTERISTICS OF MANY WIDESPREAD CRYPTOGRAPHIC ALGOR...
This paper deals with the issue of computer security, which aims to develop a robust and independent...
High performance systems have been widely adopted in many fields and the demand for better performan...
High performance systems have been widely adopted in many fields and the demand for better performan...
Abstract — In this paper, we present an investigation into the challenges in designing a network pro...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
This report documents our first year efforts to address the use of many-core processors for high per...
[[abstract]]In this paper we present a generic network security processor (NSP) design suitable for ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Graduation date: 2004Hardware cryptography offers a reliable way to provide security for data that i...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
This work illustrates the research activities related to the implementation of a suite of hardware c...
[[abstract]]In this paper, we present several techniques for low-power design, including a descripto...
This paper describes the programmable protocol processor (PRO3) architecture, which is capable of su...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
THIS WORK COMPARES AND ANALYZES ARCHITECTURAL CHARACTERISTICS OF MANY WIDESPREAD CRYPTOGRAPHIC ALGOR...
This paper deals with the issue of computer security, which aims to develop a robust and independent...
High performance systems have been widely adopted in many fields and the demand for better performan...
High performance systems have been widely adopted in many fields and the demand for better performan...
Abstract — In this paper, we present an investigation into the challenges in designing a network pro...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
This report documents our first year efforts to address the use of many-core processors for high per...
[[abstract]]In this paper we present a generic network security processor (NSP) design suitable for ...
[[abstract]]This paper presents a security processor to accelerate cryptographic processing in moder...
Graduation date: 2004Hardware cryptography offers a reliable way to provide security for data that i...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
This work illustrates the research activities related to the implementation of a suite of hardware c...
[[abstract]]In this paper, we present several techniques for low-power design, including a descripto...
This paper describes the programmable protocol processor (PRO3) architecture, which is capable of su...
Multi-core processors represent a major evolution in computing hardware technology. Multi-core provi...
THIS WORK COMPARES AND ANALYZES ARCHITECTURAL CHARACTERISTICS OF MANY WIDESPREAD CRYPTOGRAPHIC ALGOR...
This paper deals with the issue of computer security, which aims to develop a robust and independent...