Loading...
Search for:
software-control
0.009 seconds
Sharif repository-A threatened-based software security evaluation method
, Article International ISC Conference on Information Security and Cryptology, ISCISC(11th: 2014:) ; Sept , 2014 , p. 120-125 ; Sangchi, H. M ; Sharif University of Technology
Abstract
Nowadays, security evaluation of software is a substantial matter in software world. Security level of software will be determined by wealth of data and operation which it provides for us. The security level is usually evaluated by a third party, named Software Security Certification Issuance Centers. It is important for software security evaluators to perform a sound and complete evaluation, which is a complicated process considering the increasing number of emerging threats. In this paper we propose a Threatened-based Software Security Evaluation method to improve the security evaluation process of software. In this method, we focus on existing threatened entities of software which in turn...
Highly concurrent latency-tolerant register files for GPUs
, Article ACM Transactions on Computer Systems ; Volume 37, Issue 1-4 , 2021 ; 07342071 (ISSN) ; Mirhosseini, A ; Hajiabadi, A ; Ehsani, S. B ; Falahati, H ; Sarbazi Azad, H ; Drumond, M ; Falsafi, B ; Ausavarungnirun, R ; Mutlu, O ; Sharif University of Technology
Association for Computing Machinery
2021
Abstract
Graphics Processing Units (GPUs) employ large register files to accommodate all active threads and accelerate context switching. Unfortunately, register files are a scalability bottleneck for future GPUs due to long access latency, high power consumption, and large silicon area provisioning. Prior work proposes hierarchical register file to reduce the register file power consumption by caching registers in a smaller register file cache. Unfortunately, this approach does not improve register access latency due to the low hit rate in the register file cache. In this article, we propose the Latency-Tolerant Register File (LTRF) architecture to achieve low latency in a two-level hierarchical...
Designing a LQR controller for an electro-hydraulic-actuated-clutch model
, Article Proceedings of 2016 2nd International Conference on Control Science and Systems Engineering, ICCSSE 2016, 27 July 2016 through 29 July 2016 ; 2016 , Pages 82-87 ; 9781467398725 (ISBN) ; Selk Ghafari, A ; Pourebrahim, M ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
During the past decade, Electro-Hydraulic system has performed a significant role in industrial engineering as an actuator for high performance and precision positioning applications. In this case, many control methods have been developed for an electro-hydraulic actuated clutch. In this paper a Linear Quadratic Regulators (LQR) is proposed to trajectory control of a wet clutch actuated by a hydraulic servo valve mechanism. Simulation study was performed using linearized mathematical model of the system implemented in MATLAB software. Based on the simulation results performance of the proposed controller was evaluated and discussed
How local slopes stabilize passive bipedal locomotion?
, Article Mechanism and Machine Theory ; Volume 100 , 2016 , Pages 63-82 ; 0094114X (ISSN) ; Mohammadi, S ; Hajmiri, S. E ; Naraghi, M ; Alasty, A ; Sharif University of Technology
Elsevier Ltd
Abstract
By employing a few simple models of passive dynamic walking mechanism, we have shown the possibility of extending the boundaries of the maximum stable speed of these autonomous robots merely by changing their terrain. The replaced terrain consists of a series of parallel local slopes and is recognized as a general form of a ramp-stair surface. Although here, the mechanism of stabilization of the unstable locomotion patterns is not clearly known, the technique is quite simple and works effectively. The merit to the method over other strategies, could be described in two separate aspects: First, it is still completely passive; so we do not need any external energy to control the robot. Second,...
FEDC: Control flow error detection and correction for embedded systems without program interruption
, Article ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, 4 March 2008 through 7 March 2008, Barcelona ; 2008 , Pages 33-38 ; 9780769531021 (ISBN) ; Fazeli, M ; Miremadi, S. G ; Sharif University of Technology
2008
Abstract
This paper proposes a new technique called CFEDC to detect and correct control flow errors (CFEs) without program interruption. The proposed technique is based on the modification of application software and minor changes in the underlying hardware. To demonstrate the effectiveness of CFEDC, it has been implemented on an OpenRISC 1200 as a case study. Analytical results for three workload programs show that this technique detects all CFEs and corrects on average about 81.6% of CFEs. These figures are achieved with zero error detection /correction latency. According to the experimental results, the overheads are generally low as compared to other techniques; the performance overhead and the...
Coordinated actors for reliable self-adaptive systems
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 19 October 2016 through 21 October 2016 ; Volume 10231 LNCS , 2017 , Pages 241-259 ; 03029743 (ISSN) ; 9783319576657 (ISBN) ; Akkaya, I ; Khamespanah, E ; Khakpour, N ; Sirjani, M ; Movaghar, A ; Lee, E. A ; Khosravi, R ; Kouchnarenko, O ; Sharif University of Technology
Abstract
Self-adaptive systems are systems that automatically adapt in response to environmental and internal changes, such as possible failures and variations in resource availability. Such systems are often realized by a MAPE-K feedback loop, where Monitor, Analyze, Plan and Execute components have access to a runtime model of the system and environment which is kept in the Knowledge component. In order to provide guarantees on the correctness of a self-adaptive system at runtime, the MAPE-K feedback loop needs to be extended with assurance techniques. To address this issue, we propose a coordinated actor-based approach to build a reusable and scalable model@runtime for self-adaptive systems in the...