HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment

Summary "To ensure secure and trustworthy execution of applications, vendors frequently embed trusted execution environments into their systems. Here, applications are protected from adversaries, including a malicious operating system. TEEs are usually built by integrating protection mechanisms directly into the processor or by using dedicated external secure elements. However, both of these... » read more

Using CNNs To Speed Up Systems

Convolutional neural networks (CNNs) are becoming one of the key differentiators in system performance, reversing a decades-old trend that equated speed with processor clock frequencies, the number of transistors, and the instruction set architecture. Even with today's smartphones and PCs, it's difficult for users to differentiate between processors with 6, 8 or 16 cores. But as the amount o... » read more

CPU Architectures Get Specific

By Ann Steffora Mutschler SoC and system design is already complicated, but as complexity continues to rise the industry must determine how to maintain sensitivity to power and cost and performance in the CPU architecture. Where does this stand today—not just with architectures and microarchitectures for consumer electronics but all other kinds of applications? What kinds of changes... » read more