Amdahl's law in the context of heterogeneous many‐core systems–a survey

MAN Al‐hayanni, F Xia, A Rafiev… - IET Computers & …, 2020 - Wiley Online Library
For over 50 years, Amdahl's Law has been the hallmark model for reasoning about
performance bounds for homogeneous parallel computing resources. As heterogeneous …

Real-power computing

R Shafik, A Yakovlev, S Das - IEEE Transactions on Computers, 2018 - ieeexplore.ieee.org
The traditional hallmark in embedded systems is to minimize energy consumption
considering hard or soft real-time deadlines. The basic principle is to transfigure the …

PARMA: Parallelization-aware run-time management for energy-efficient many-core systems

MAN Al-Hayanni, A Rafiev, F Xia… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Performance and energy efficiency considerations have shifted computing paradigms from
single-core to many-core architectures. At the same time, traditional speedup models such …

Model-free runtime management of concurrent workloads for energy-efficient many-core heterogeneous systems

A Aalsaud, A Rafiev, F Xia, R Shafik… - … Symposium on Power …, 2018 - ieeexplore.ieee.org
Modern embedded systems execute multiple applications, both sequentially and
concurrently, on heterogeneous platforms. Determining the most energy-efficient system …

Efficient hardware realization and high radix implementation of modular multi exponential techniques for public key cryptography

U Tiwari, S Vollala, N Ramasubramanian… - Microelectronics …, 2022 - Elsevier
Modular multi exponentiation (MME) is a critical operation in most of the public-key
cryptosystems and verification functions. Two novel algorithms: HRMME and SFWHRMME …

A new direct acyclic graph task scheduling method for heterogeneous Multi-Core processors

X Feng, C Shushan, H Xingxing, H Shujuan… - Computers and …, 2022 - Elsevier
At present, the traditional methods of calculating the worst response time upper bounds for
direct acyclic graph (DAG) task scheduling on heterogeneous multi-core platforms suffer …

Improving the performance of authentication protocols using efficient modular multi exponential technique

U Tiwari, S Vollala, RN, S Begum - Multimedia Tools and Applications, 2024 - Springer
Efficient and secure authentication of the user in today's world, where most of the multimedia
data is shared over the public network, is essential. The verification step of the multi-user …

Energy efficient triple-modular exponential techniques for batch verification schemes

S Vollala - Journal of Cryptographic Engineering, 2024 - Springer
Most of the authentication protocols have modular multi-exponentiation (MME) as their core
operation in the verification step. Triple modular-multi exponentiation playing a vital role in …

Secure and energy efficient design of multi-modular exponential techniques for public-key cryptosystem

U Tiwari, S Vollala… - Journal of …, 2022 - ieeexplore.ieee.org
The present paper proposes a secure design of the energy-efficient multi-modular
exponential techniques that use store and reward method and store and forward method …

Evaluating the effects of reducing voltage margins for energy-efficient operation of MPSoCs

DVC do Nascimento, K Georgiou… - IEEE Embedded …, 2023 - ieeexplore.ieee.org
Voltage margins, or guardbands, are imposed on DVFS systems to account for process,
voltage, and temperature variability effects. While necessary to assure correctness …