Essays about: "cache"

Showing result 36 - 40 of 174 essays containing the word cache.

  1. 36. Comparing priority queues with support for priority updates at arbitrary indexes

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Erik Granberg; [2021]
    Keywords : ;

    Abstract : The research software URDME makes use of a priority queue that has support for updating the priority of enqueued elements at arbitrary indexes. To achieve this URDME currently relies on a Binary Heap. READ MORE

  2. 37. Investigating the effect of implementing Data-Oriented Design principles on performance and cache utilization

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Frank Nyberg; [2021]
    Keywords : Data-oriented design; DOD; ECS; Entity Component System; HPC; CPU cache; cache misses; games; game architecture; game engines; design patterns;

    Abstract : Game engines process a lot of data under strict deadlines. Therefore, measures to increase performance are important in this area. Data-Oriented Design (DOD) promotes principles that are meant to increase performance by better cache utilization. READ MORE

  3. 38. Validating Side Channel models in RISC-V using Model-Based Testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Viktor Vitek; [2021]
    Keywords : Observational model · Side-channel analysis and countermeasures · Embedded systems security · Model-based Testing; Observationsmodell · Sidokanal analys och motåtgärder · Inbyggda system säkerhet · Model-Baserad Testning;

    Abstract : Microarchitecture’s optimizations have increased the performance but lowered the security. Speculative execution is one of the optimizations that was thought to be secure, but it is exploitable to leak information. READ MORE

  4. 39. Understanding the MicroScope Microarchitectural Replay Attack Through a New Implementation

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Clara Tillman; [2021]
    Keywords : ;

    Abstract : Side-channel attacks, where information is extracted through analysis of the implementation of a computer system by a malicious adversary, constitute security vulnerabilities that may be hard to mitigate. They however suffer from noise originating from, for example, other processes or frequent cache evictions, which forces an attacker to repeat the attack a large number of times in order to obtain useful information. READ MORE

  5. 40. Multi-core Support on a Robot Controller

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Ghaith Sankari; [2021]
    Keywords : ;

    Abstract : The demand for high performance, accuracy, and other requirements is increasing due to the numerous complex functionalities that an industrial robot performs such as arc welding. The software support and utilization of multi-cores can achieve higher performance, lower latency, and lower energy consumption compared to uni-processors. READ MORE