Computer Architecture Seminar: Memory Access Dataflow

In this talk, I will describe some recent work in my research group on building a memory access accelerator. Our work is motivated by observing that many accelerators being proposed integrate or interact with a high-performance microprocessor. In such cases, the microprocessor becomes a significant power hog, while a low performance processor limits the accelerator's effectiveness.

CANCELLED: Oblivious Computation and Storage: Building a More Secure Cloud

Please note:  This event has been cancelled.

As cloud computing becomes increasingly popular, organizations face greater security threats. Public clouds have become a central point of attack and successful compromises can cause potentially billions of dollars of damage. Physical attacks on data center machines are very concerning because an attacker can gain full control of the machines and circumvent software protections.

Computer Architecture Seminar: Disciplined Approximate Computing: From Language to Hardware, and Beyond

Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. A key challenge, though, is how to isolate parts of the program that must be precise from those that can be approximated so that a program functions correctly even as quality of service degrades. Addressing that challenge leads to opportunities for approximate computing across the entire system stack.

How to Obfuscate Software

Software obfuscation aims to make the code of a computer program "unintelligible'' while preserving its functionality. This problem was first posed by Diffie and Hellman in 1976, and so far, most cryptographers believed that realizing obfuscation was impossible.

My research provides the first secure solution to this problem. Consequently several other long-standing open problems have been resolved. In this talk, I will describe these new developments and their implications.

Speaker bio:

Taming The Interference: Limited Wireless Networks

By 2020, there will be billions of devices connecting to the Internet. These devices will be ubiquitous and will generate large amounts of sensing and monitoring data that will enable a multitude of applications to improve human life. The key enabler of this vision is the underlying wireless communication technology. However, current wireless networks are notoriously interference-limited. With the number of devices increasing to the billions in the future, current solutions will be crippled to support the amount of data that needs to be communicated.

Pages

Subscribe to UW-Madison Computer Sciences Department RSS