(Back to Session Schedule)

The 21st Asia and South Pacific Design Automation Conference

Session 5B  Advanced Embedded Software Techniques: Sensing, Computation, and Storage
Time: 13:50 - 15:55 Wednesday, January 27, 2016
Location: TF4304
Chairs: Zili Shao (Hong Kong Polytechnic University, China), Duo Liu (Chongqing University, China)

5B-1 (Time: 13:50 - 14:15)
TitleMulti-version Checkpointing for Flash File Systems
Author*Shih-Chun Chou (Department of Computer Science and Information Engineering, National Taiwan University, Taiwan), Yuan-Hao Chang, Yuan-Hung Kuan (Institute of Information Science, Academia Sinica, Taiwan), Po-Chun Huang (Department of Computer Science and Engineering, Yuan Ze University, Taiwan), Che-Wei Tsao (Department of Computer Science and Information Engineering, National Taiwan University, Taiwan)
Pagepp. 436 - 443
Keywordfile system, multi-version checkpointing, reliability
AbstractReliability has become a critical design issue in flash storage systems, because of the adoption of the low-cost, high-error-rate flash chips to fulfill the needs of the fast-growing storage capacity. In this paper, a multi-version checkpointing strategy is proposed to resolve the reliability issue of flash storage systems from the perspective of flash file systems. The proposed strategy can efficiently and effectively utilize checkpoints of file systems to guarantee the integrity and consistency of flash file systems after files or flash pages are corrupted. By utilizing the coexistence fact of multiple versions of the same data in flash memory, a control/recovery mechanism is presented to maintain checkpoints and to recover file systems with minimized management and recovery time overheads. A series of experiments was conducted based on realistic traces that were collected from benchmarks running over flash file systems in Linux operating systems. The results illustrate that the proposed strategy can significantly improve the reliability of flash file systems, as compared with other existing designs.
Slides

5B-2 (Time: 14:15 - 14:40)
TitleRelay-based Key Management to Support Secure Deletion for Resource-Constrained Flash-Memory Storage Devices
AuthorWei-Lin Wang (Department of Computer Science, National Tsing Hua University, Taiwan), Yuan-Hao Chang (Institute of Information Science, Academia Sinica, Taiwan), *Po-Chun Huang (Department of Computer Science and Engineering, Yuan Ze University, Taiwan), Chia-Heng Tu (Smart Network System Institute, Institute for Information Industry, Taiwan), Hsin-Wen Wei (Department of Electrical Engineering, Tamkang University, Taiwan), Wei-Kuan Shih (Department of Computer Science, National Tsing Hua University, Taiwan)
Pagepp. 444 - 449
Keywordreliability, flash memory, key management, secure deletion
AbstractThe support of secure deletion on formatting a file system is to make sure that when a file system is formatted, there is no way to get any file content back again. Due to the fast-growing storage capacity, the performance of secure deletion to file systems on resource-constrained flash storage devices has become a critical issue. In contrast to the existing works that take a long time on overwriting/resetting all the file contents of a file system, we propose an efficient secure deletion scheme to securely delete all the contents of a file system without rewriting file contents. Thus, secure deletion to file systems can be efficiently achieved and can be independent of the device capacity and file systems. A series of experiments was conducted with realistic workloads to evaluate the capability of the proposed scheme. The results show that the proposed scheme achieves secure deletion with limited performance overheads in most cases.
Slides

5B-3 (Time: 14:40 - 15:05)
TitlePeak-to-average Pumping Efficiency Improvement for Charge Pump in Phase Change Memories
AuthorHuizhang Luo (Chongqing University, China), Jingtong Hu (Oklahoma State University, U.S.A.), *Liang Shi (Chongqing University, China), Chun Jason Xue (City University of Hong Kong, Hong Kong), Qingfeng Zhuge (Chongqing University, China)
Pagepp. 450 - 455
KeywordPCM, Charge Pump
AbstractThe pumping efficiency of a PCM chip is a concave function of the write current. Based on the characteristics of the concave function, the overall pumping efficiency can be improved if the write current is uniform. In this paper, we propose the peak-to-average (PTA) write scheme, which smooths the write current fluctuation by regrouping write units. An off-line optimal Integer Programming (IP) formulation and an efficient online algorithm are proposed to achieve this goal. Experimental results show that PTA can improve the charge pump efficiency greatly with little overhead.
Slides

5B-4 (Time: 15:05 - 15:30)
TitleExploiting Parallelism of Imperfect Nested Loops with Sibling Inner Loops on Coarse-Grained Reconfigurable Architectures
Author*Xinhan Lin, Shouyi Yin, Leibo Liu, Shaojun Wei (Tsinghua University, China)
Pagepp. 456 - 461
KeywordCGRA, software pipelining, imperfect nested loop, outer-level pipelining, kernel compression
AbstractCoarse-grained reconfigurable architecture (CGRA) is a promising platform for loop acceleration, but existing software pipelining methods cannot achieve satisfactory performance on a fair number of imperfect nested loops, especially those with sibling inner loops. To tackle this problem, this paper makes 2 contributions: 1) a 2-level pipelining method with an effective II optimization strategy for the imperfect loops with sibling inner loops; 2) a novel kernel compression method to reduce oversize kernel. Experiment results show that our approach can achieve much higher performance than the state-of-the-art approaches at acceptable costs.

5B-5 (Time: 15:30 - 15:55)
TitleSlowMo – Enhancing Mobile Gesture-Based Authentication Schemes via Sampling Rate Optimization
Author*Kent W. Nixon, Xiang Chen, Zhi-Hong Mao, Yiran Chen (University of Pittsburgh, U.S.A.)
Pagepp. 462 - 467
Keywordgesture, security, sample, rate
AbstractIn the era of network service, the user authentication become more indispensable but also vulnerable. Traditional user verification approaches such as PIN or pattern lock suffer from easy hacking and replica. A promising approach to continuous user verification on mobile is gesture-based security, Compare to the traditional authentications, the gesture-based security utilize the user interacts with the device as a dynamic authentication pattern in real-time. It has high complexity and better reliability. But it still lack sufficient research on data sampling and preprocessing techniques on classification accuracy. In this work, we develop SlowMo, a novel gesture security technique, and utilize it for user classification in low sampling-rate environments. The proposed algorithm provides maximum classification accuracy at a sampling rate of 4Hz with extreme low power consumption suggesting a more capable adaptation to the security environment.
Slides