Software & Hardware Foundation
group_project
Submitted by Anonymous on Mon, 07/30/2018 - 10:53am
Today's systems demand acceleration in processing and learning using massive datasets. Unfortunately, because of poor energy scaling and power limits, performance and power improvements due to technology scaling and instruction level parallelism in general-purpose processors have ended. It is well known that full custom, application-specific hardware accelerators can provide orders-of-magnitude improvements in energy/op for a variety of application domains.
group_project
Submitted by Timothy Sherwood on Wed, 12/20/2017 - 2:51pm
Computer performance has doubled many times over during the past 40 years, but the very techniques used to achieve these performance gains have made it increasingly difficult to build systems that are provably safe, secure, or reliable. This fact significantly impedes progress in the development of our most safety-critical embedded systems such as those found in medical, avionic, automotive, and military systems.
group_project
Submitted by Sencun Zhu on Tue, 12/19/2017 - 11:15am
Software plagiarism is an act of reusing someone else's code, in whole or in part, into one own program in a way violating the terms of original license. Along with the rapid developing software industry and the burst of open source projects, software plagiarism has become a very serious threat to Intellectual Property Protection and the "healthiness" of the open-source-embracing software industry.
group_project
Submitted by Stephen Chong on Tue, 12/19/2017 - 11:12am
Distributed applications (such as web applications and cloud-based applications, where multiple computers cooperate to run the application) are becoming increasingly common. Given the amount of commercial activity and information handled by these distributed applications, it is important that these applications are correct, reliable, and efficient. However, many traditional tools and techniques for programmers cannot be used for distributed applications, making it difficult for programmers to write and debug distributed applications.
group_project
Submitted by Stephen Chong on Sat, 12/02/2017 - 7:58pm
This aim of this workshop is to identify existing successes and opportunities for applying formal methods to security problems, and raise awareness of these opportunities in relevant communities, including academia, industry, and government research labs. The workshop will bring together researchers from academia, industry, and government research labs that are working in the areas of security and formal methods, and researchers currently applying formal methods to security problems.