SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Hemani Ahmed) "

Sökning: WFRF:(Hemani Ahmed)

  • Resultat 11-20 av 284
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
11.
  • Abbas, Haider, 1979- (författare)
  • Options-Based Security-Oriented Framework for Addressing Uncerainty Issues in IT Security
  • 2010
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Continuous development and innovation in Information Technology introduces novel configuration methods, software development tools and hardware components. This steady state of flux is very desirable as it improves productivity and the overall quality of life in societies. However, the same phenomenon also gives rise to unseen threats, vulnerabilities and security concerns that are becoming more critical with the passage of time. As an implication, technological progress strongly impacts organizations’ existing information security methods, policies and techniques, making obsolete existing security measures and mandating reevaluation, which results in an uncertain IT infrastructure. In order to address these critical concerns, an options-based reasoning borrowed from corporate finance is proposed and adapted for evaluation of security architecture and decision- making to handle them at organizational level. Options theory has provided significant guidance for uncertainty management in several domains, such as Oil & Gas, government R&D and IT security investment projects. We have applied options valuation technique in a different context to formalize optimal solutions in uncertain situations for three specific and identified uncertainty issues in IT security. In the research process, we formulated an adaptation model for expressing options theory in terms useful for IT security which provided knowledge to formulate and propose a framework for addressing uncertainty issues in information security. To validate the efficacy of this proposed framework, we have applied this approach to the SHS (Spridnings- och Hämtningssystem) and ESAM (E-Society) systems used in Sweden. As an ultimate objective of this research, we intend to develop a solution that is amenable to automation for the three main problem areas caused by technological uncertainty in information security: i) dynamically changing security requirements, ii) externalities caused by a security system, iii) obsoleteness of evaluation. The framework is general and capable of dealing with other uncertainty management issues and their solutions, but in this work we primarily deal with the three aforementioned uncertainty problems. The thesis presents an in-depth background and analysis study for a proposed options-based security-oriented framework with case studies for SHS and ESAM systems. It has also been assured that the framework formulation follows the guidelines from industry best practices criteria/metrics. We have also proposed how the whole process can be automated as the next step in development.
  •  
12.
  •  
13.
  • Abbas, Haider, et al. (författare)
  • Security Evaluation of IT Products : Bridging the Gap between Common Criteria (CC) and Real Option Thinking
  • 2008
  • Ingår i: WCECS 2008. - 9789889867102 ; , s. 530-533
  • Konferensbidrag (refereegranskat)abstract
    • Information security has long been considered as a key concern for organizations benefiting from the electronic era. Rapid technological developments have been observed in the last decade which has given rise to novel security threats, making IT, an uncertain infrastructure. For this reason, the business organizations have an acute need to evaluate the security aspects of their IT infrastructure. Since many years, CC (Common Criteria) has been widely used and accepted for evaluating the security of IT products. It does not impose predefined security rules that a product should exhibit but a language for security evaluation. CC has certain advantages over ITSEC1, CTCPEC2 and TCSEC3 due to its ability to address all the three dimensions: a) it provides opportunity for users to specify their security requirements, b) an implementation guide for the developers and c) provides comprehensive criteria to evaluate the security requirements. Among the few notable shortcomings of CC is the amount of resources and a lot of time consumption. Another drawback of CC is that the security requirements in this uncertain IT environment must be defined before the project starts. ROA is a well known modern methodology used to make investment decisions for the projects under uncertainty. It is based on options theory that provides not only strategic flexibility but also helps to consider hidden options during uncertainty. ROA comes in two flavors: first for the financial option pricing and second for the more uncertain real world problems where the end results are not deterministic. Information security is one of the core areas under consideration where researchers are employing ROA to take security investment decisions. In this paper, we give a brief introduction of ROA and its use in various domains. We will evaluate the use of Real options based methods to enhance the Common Criteria evaluation methodology to manage the dynamic security requirement specification and reducing required time and resources. We will analyze the possibilities to overcome CC limitations from the perspective of the end user, developer and evaluator. We believe that with the ROA enhanced capabilities will potentially be able to stop and possibly reverse this trend and strengthen the CC usage with a more effective and responsive evaluation methodology.
  •  
14.
  •  
15.
  • Altayo Gonzalez, u1dr0yqp, et al. (författare)
  • Synthesis of Predictable Global NoC by Abutment in Synchoros VLSI Design
  • 2021
  • Ingår i: Proceedings - 2021 15th IEEE/ACM International Symposium on Networks-on-Chip, NOCS 2021. - New York, NY, USA : Association for Computing Machinery (ACM). ; , s. 61-66
  • Konferensbidrag (refereegranskat)abstract
    • Synchoros VLSI design style has been proposed as an alternative to the standard cell-based design style; the word synchoros is derived from the Greek word choros for space. Synchoricity discretises space with a virtual grid, the way synchronicity discretises time with clock ticks. SiLago (Silicon Lego) blocks are atomic synchoros building blocks like Lego bricks. SiLago blocks absorb all metal layer details, i.e., all wires, to enable composition by abutment of valid; valid in the sense of being technology design rules compliant, timing clean and OCV ruggedized. Effectively, composition by abutment eliminates logic and physical synthesis for the end user. Like Lego system, synchoricity does need a finite number of SiLago block types to cater to different types of designs. Global NoCs are important system level design components. In this paper, we show, how with a small library of SiLago blocks for global NoCs, it is possible to automatically synthesize arbitrary global NoCs of different types, dimensions, and topology. The synthesized global NoCs are not only valid VLSI designs, but their cost metrics (area, latency, and energy) are known with post-layout accuracy in linear time. We argue that this is essential to be able to do chip-level design space exploration. We show how the abstract timing model of such global NoC SiLago blocks can be built and used to analyse the timing of global NoC links with post layout accuracy and in linear time. We validate this claim by subjecting the same VLSI designs of global NoC to commercial EDA's static timing analysis and show that the abstract timing analysis enabled by synchoros VLSI design gives the same results as the commercial EDA tools.
  •  
16.
  • Anagnostopoulos, I., et al. (författare)
  • Power-Aware Dynamic Memory Management on Many-Core Platforms Utilizing DVFS
  • 2013
  • Ingår i: ACM Transactions on Embedded Computing Systems. - : Association for Computing Machinery (ACM). - 1539-9087 .- 1558-3465. ; 13:1, s. 40-
  • Tidskriftsartikel (refereegranskat)abstract
    • Today multicore platforms are already prevalent solutions for modern embedded systems. In the future, embedded platforms will have an even more increased processor core count, composing many-core platforms. In addition, applications are becoming more complex and dynamic and try to efficiently utilize the amount of available resources on the embedded platforms. Efficient memory utilization is a key challenge for application developers, especially since memory is a scarce resource and often becomes the system's bottleneck. To cope with this dynamism and achieve better memory footprint utilization (lowmemory fragmentation) application developers resort to the usage of dynamic memory (heap) management techniques, by allocating and deallocating data at runtime. Moreover, overall power consumption is another key challenge that needs to be taken into consideration. Towards this, designers employ the usage of Dynamic Voltage and Frequency Scaling (DVFS) mechanisms, adapting to the application's computational demands at runtime. In this article, we propose the combination of dynamic memory management techniques with DVFS ones. This is performed by integrating, within thememorymanager, runtimemonitoringmechanisms that steer the DVFSmechanisms to adjust clock frequency and voltage supply based on heap performance. The proposed approach has been evaluated on a distributed shared-memory many-core platform composed of multiple LEON3 processors interconnected by a Network-on-Chip infrastructure, supporting DVFS. Experimental results show that by using the proposed method for monitoring and applying DVFS mechanisms the power consumption concerning dynamic memory management was reduced by approximately 37%. In addition we present the trade-offs the proposed approach. Last, by combining the developed method with heap fragmentation-aware dynamic memory managers, we achieve low heap fragmentation values combined with low power consumption.
  •  
17.
  • Anwar, Hassan, et al. (författare)
  • Exploring Spiking Neural Network on Coarse-Grain Reconfigurable Architectures
  • 2014
  • Ingår i: ACM International Conference Proceeding Series. - New York, NY, USA : ACM. - 9781450328227 ; , s. 64-67
  • Konferensbidrag (refereegranskat)abstract
    • Today, reconfigurable architectures are becoming increas- ingly popular as the candidate platforms for neural net- works. Existing works, that map neural networks on re- configurable architectures, only address either FPGAs or Networks-on-chip, without any reference to the Coarse-Grain Reconfigurable Architectures (CGRAs). In this paper we investigate the overheads imposed by implementing spiking neural networks on a Coarse Grained Reconfigurable Ar- chitecture (CGRAs). Experimental results (using point to point connectivity) reveal that up to 1000 neurons can be connected, with an average response time of 4.4 msec.
  •  
18.
  • Azad, S. P., et al. (författare)
  • Customization methodology of a Coarse Grained Reconfigurable architecture
  • 2015
  • Ingår i: NORCHIP 2014 - 32nd NORCHIP Conference. - 9781479954421
  • Konferensbidrag (refereegranskat)abstract
    • Mapping algorithms on CGRAs can lead to an inefficient implementation and hardware under-utilization if there is a mismatch between the granularity of reconfigurable processing unit and the algorithm. In this paper, we introduce a tool that takes the hardware configuration of a set of applications, identifies the unused parts of the CGRA, and let the user sweep the design space from fully programmable to fully customized by eliminating the unused components. User can select among multiple design points according to the application specification. This method is very useful to design multi-mode ASIC accelerators. The fully customized hardware generated using our tool has a negligible area and power overhead compared to the equivalent ASIC but can be generated significantly faster.
  •  
19.
  • Baccelli, Guido, et al. (författare)
  • NACU : A Non-Linear Arithmetic Unit for Neural Networks
  • 2020
  • Ingår i: PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC). - : IEEE.
  • Konferensbidrag (refereegranskat)abstract
    • Reconfigurable architectures targeting neural networks are an attractive option. They allow multiple neural networks of different types to be hosted on the same hardware, in parallel or sequence. Reconfig-urability also grants the ability to morph into different micro-architectures to meet varying power-performance constraints. In this context, the need for a reconfigurable non-linear computational unit has not been widely researched. In this work, we present a formal and comprehensive method to select the optimal fixed-point representation to achieve the highest accuracy against the floating-point implementation benchmark. We also present a novel design of an optimised reconfigurable arithmetic unit for calculating non-linear functions. The unit can be dynamically configured to calculate the sigmoid, hyperbolic tangent, and exponential function using the same underlying hardware. We compare our work with the state-of-the-art and show that our unit can calculate all three functions without loss of accuracy.
  •  
20.
  • Badawi, Mohammad, et al. (författare)
  • A Coarse-Grained Reconfigurable Protocol Processor
  • 2011
  • Ingår i: International Symposium on System-on-Chip, 2011. Proceedings.
  • Konferensbidrag (refereegranskat)abstract
    • Trade-off between flexibility and performance became an important factor for characterizing modern protocol processing architectures. While some solutions tend to be more flexible and less computational efficient like GPPs, other solutions like custom ASIC devices provide high computational efficiency while loosing the ability to cope with the diversity of current and evolving protocols. We propose a reconfigurable protocol processor that is flexible and highly adaptable to the needs of the required protocol with the ability to operate individually or as a multi-core integrating processors. We show how a common protocol processing task that consumes one third of RISC CPU time can be performed on our processor at high speed and low energy cost.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 11-20 av 284
Typ av publikation
konferensbidrag (212)
tidskriftsartikel (43)
doktorsavhandling (11)
rapport (8)
bokkapitel (4)
annan publikation (2)
visa fler...
licentiatavhandling (2)
samlingsverk (redaktörskap) (1)
proceedings (redaktörskap) (1)
visa färre...
Typ av innehåll
refereegranskat (246)
övrigt vetenskapligt/konstnärligt (38)
Författare/redaktör
Hemani, Ahmed (225)
Hemani, Ahmed, 1961- (47)
Jantsch, Axel (44)
Tenhunen, Hannu (43)
Öberg, Johnny (41)
Ellervee, Peeter (36)
visa fler...
Paul, Kolin (30)
Kumar, Shashi (24)
Stathis, Dimitrios (22)
Plosila, Juha (20)
Farahini, Nasim (20)
Postula, Adam (20)
Svantesson, Bengt (19)
Abbas, Haider (16)
Yngström, Louise (16)
Li, Shuo (15)
Yang, Yu (15)
Jafri, Syed Mohammad ... (14)
Kumar, Anshul (13)
Jafri, Syed (11)
O'Nils, Mattias (10)
Daneshtalab, Masoud (10)
Chabloz, Jean-Michel (10)
Penolazzi, Sandro (10)
Hemani, Ahmed, Profe ... (9)
Tajammul, Muhammad A ... (9)
Lu, Zhonghai (8)
Liu, Pei (8)
Lindqvist, Dan (8)
Meincke, Thomas (8)
Jafri, Syed M. A. H. (8)
Magnusson, Christer (7)
Sander, Ingo (7)
Badawi, Mohammad (7)
Lansner, Anders, Pro ... (6)
Zou, Zhuo (6)
Shami, Muhammad Ali (6)
Olsson, Thomas (5)
Nilsson, Peter (5)
Deb, Abhijit Kumar (5)
Sohofi, Hassan (5)
Isoaho, Jouni (5)
Mokhtari, Mehran (5)
Xu, Jiawei (5)
Zheng, Li-Rong (4)
Lansner, Anders (4)
Li, Feng (4)
Lansner, Anders, Pro ... (4)
Boppu, Srinivas (4)
Wang, Deyu (4)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (272)
Stockholms universitet (13)
Lunds universitet (4)
Mittuniversitetet (3)
Uppsala universitet (2)
Högskolan i Halmstad (2)
visa fler...
Umeå universitet (1)
Linköpings universitet (1)
Jönköping University (1)
visa färre...
Språk
Engelska (282)
Odefinierat språk (2)
Forskningsämne (UKÄ/SCB)
Teknik (225)
Naturvetenskap (51)
Medicin och hälsovetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy