DRAM Simulator For Evaluation of Memory System Design Changes (ETH Zurich)


A technical paper titled “Ramulator 2.0: A Modern, Modular, and Extensible DRAM Simulator” was published by researchers at ETH Zurich. Abstract: "We present Ramulator 2.0, a highly modular and extensible DRAM simulator that enables rapid and agile implementation and evaluation of design changes in the memory controller and DRAM to meet the increasing research effort in improving the perfo... » read more

Technical Paper Roundup: Sept 5


New technical papers added to Semiconductor Engineering’s library this week. [table id=132 /] (more…) » read more

Security Research: Technical Paper Round-up


A number of hardware security-related technical papers were presented at the August 2023 USENIX Security Symposium. Here are some highlights with associated links. [table id=130 /] A complete listing of all papers presented at this summer's USENIX conference can be found here and here. The organization provides open access research, and the presentation slides and papers are free to the p... » read more

Contacting Individual On-Surface Synthesized Graphene Nanoribbons In A Multigate Transistor Geometry 


A technical paper titled “Contacting individual graphene nanoribbons using carbon nanotube electrodes” was published by researchers at Swiss Federal Laboratories for Materials Science and Technology, Peking University, University of Warwick, National Center for Nanoscience and Technology (China), Max Planck Institute for Polymer Research, University of Bern, University of Basel, and ETH Zur... » read more

Transient Execution Attacks That Leaks Arbitrary Kernel Memory (ETH Zurich)


A technical paper titled “Inception: Exposing New Attack Surfaces with Training in Transient Execution” was published by researchers at ETH Zurich. Abstract: "To protect against transient control-flow hijacks, software relies on a secure state of microarchitectural buffers that are involved in branching decisions. To achieve this secure state, hardware and software mitigations restrict or... » read more

Week In Review: Automotive, Security and Pervasive Computing


The AAA Foundation for Traffic Safety estimates that between 2021 and 2050, ADAS technologies currently available to U.S. will prevent "approximately 37 million crashes, 14 million injuries, and nearly 250,000 deaths, which would represent 16% of crashes and injuries, and 22% of deaths that would otherwise occur on U.S. roads without these technologies," according to a new report. Governmen... » read more

Week In Review: Auto, Security, Pervasive Computing


Intel issued an advisory of a potential security vulnerability in some of its processors. The company recommends updating to the latest firmware version. NVIDIA unveiled its GH200 Grace Hopper platform, based on 144 Arm Neoverse cores and 282GB of HBM3e memory. Meanwhile, Chinese internet companies including Baidu, ByteDance, Tencent, and Alibaba ordered about $5 billion worth of A800 proces... » read more

Chip Industry’s Technical Paper Roundup: August 9


New technical papers recently added to Semiconductor Engineering’s library: [table id=124 /] More Reading Technical Paper Library home » read more

Week In Review: Auto, Security, Pervasive Computing


Hyundai, Samsung Catalyst Fund, and others invested a combined $100 million in Canada-based Tenstorrent to accelerate the design and development of AI chiplets and machine-learning software and allow the integration of AI into future Hyundai, Kia, and Genesis vehicles, plus other future mobilities such as robotics and advanced air mobility (AAM). The National Highway Traffic Safety Administr... » read more

Analog Circuits Enabling Learning in Mixed-Signal Neuromorphic SNNs, With Tristate Stability and Weight Discretization Circuits


A technical paper titled “Neuromorphic analog circuits for robust on-chip always-on learning in spiking neural networks” was published by researchers at University of Zurich and ETH Zurich. Abstract: "Mixed-signal neuromorphic systems represent a promising solution for solving extreme-edge computing tasks without relying on external computing resources. Their spiking neural network circui... » read more

← Older posts Newer posts →