Search Results - "McMahan, Joseph"
-
1
LastLayer: Toward Hardware and Software Continuous Integration
Published in IEEE MICRO (01-07-2020)“…This article presents LastLayer, an open-source tool that enables hardware and software continuous integration and simulation. Compared to traditional testing…”
Get full text
Journal Article -
2
Trace Wringing for Program Trace Privacy
Published in IEEE MICRO (01-05-2020)“…A quantitative approach to optimizing computer systems requires a good understanding of how applications exercise a machine, and real program traces from…”
Get full text
Journal Article -
3
Safe functional systems through integrity types and verified assembly
Published in Theoretical computer science (06-01-2021)“…•Zarf is a lambda calculus-based instruction set architecture for program analysis.•We formally describe the ISA's syntax and semantics and prove its…”
Get full text
Journal Article -
4
Bouncer: Static Program Analysis in Hardware
Published in 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA) (01-06-2019)“…When discussing safety and security for embedded systems, we typically divide the world into software checks (which are either static or dynamic) or hardware…”
Get full text
Conference Proceeding -
5
An Architecture for Analysis
Published in IEEE MICRO (01-05-2018)“…We propose an architecture controlled by a thin computational layer designed to tightly correspond with the lambda calculus, drawing on principles of…”
Get full text
Journal Article -
6
The ZARF Architecture for Recursive Functions
Published 01-01-2019“…For highly critical workloads, the legitimate fear of catastrophic failure leads to both highly conservative design practices and excessive assurance costs…”
Get full text
Dissertation -
7
Hiding Intermittent Information Leakage with Architectural Support for Blinking
Published in 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) (01-06-2018)“…As demonstrated by numerous practical attacks, the physical act of computation emits unintended and damaging information through infinitesimal variations in…”
Get full text
Conference Proceeding -
8
To Catch a Joke Thief, or Copyrighting Vaudeville Acts in the New York Clipper Registry
Published in Nineteenth century theatre and film (01-05-2022)“…In the early part of the twentieth century, the trade publication the New York Clipper created a way for vaudeville artists to claim priority over acts, songs,…”
Get full text
Journal Article -
9
Charm: A Language for Closed-Form High-Level Architecture Modeling
Published in 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) (01-06-2018)“…As computer architecture continues to expand beyond software-agnostic microarchitecture to data center organization, reconfigurable logic, heterogeneous…”
Get full text
Conference Proceeding -
10
A pythonic approach for rapid hardware prototyping and instrumentation
Published in 2017 27th International Conference on Field Programmable Logic and Applications (FPL) (01-09-2017)“…We introduce PyRTL, a Python embedded hardware design language that helps concisely and precisely describe digital hardware structures. Rather than attempt to…”
Get full text
Conference Proceeding -
11
Pure Tensor Program Rewriting via Access Patterns (Representation Pearl)
Published 19-05-2021“…Tensor kernels in machine learning (ML) often correspond to pure mathematical expressions, making term rewriting an attractive strategy for optimization and…”
Get full text
Journal Article -
12
Challenging on-chip SRAM security with boot-state statistics
Published in 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (01-05-2017)“…On-chip memory is regarded by most secure system designers as a safe memory space, beyond the eyes of all but the most sophisticated attackers. Once a value is…”
Get full text
Conference Proceeding -
13
Perineal lipoma simulating perineal hernia
Published in The American journal of surgery (01-05-1950)Get more information
Journal Article