The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] flag(7hit)

1-7hit
  • SMARTLock: SAT Attack and Removal Attack-Resistant Tree-Based Logic Locking

    Yung-Chih CHEN  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E103-A No:5
      Page(s):
    733-740

    Logic encryption is an IC protection technique which inserts extra logic and key inputs to hide a circuit's functionality. An encrypted circuit needs to be activated with a secret key for being functional. SAT attack and Removal attack are two most advanced decryption methods that have shown their effectiveness to break most of the existing logic encryption methods within a few hours. In this paper, we propose SMARTLock, a SAT attack and reMoval Attack-Resistant Tree-based logic Locking method, for resisting them simultaneously. To encrypt a circuit, the method finds large AND and OR functions in it and encrypts them by inserting duplicate tree functions. There are two types of structurally identical tree encryptions that aim to resist SAT attack and Removal attack, respectively. The experimental results show that the proposed method is effective for encrypting a set of benchmarks from ISCAS'85, MCNC, and IWLS. 16 out of 40 benchmarks encrypted by the proposed method with the area overhead of no more than 5% are uncrackable by SAT attack within 5 hours. Additionally, compared to the state-of-the-art logic encryption methods, the proposed method provides better security for most benchmarks.

  • Random Access Control Scheme with Reservation Channel for Capacity Expansion of QZSS Safety Confirmation System Open Access

    Suguru KAMEDA  Kei OHYA  Tomohide TAKAHASHI  Hiroshi OGUMA  Noriharu SUEMATSU  

     
    PAPER

      Vol:
    E102-A No:1
      Page(s):
    186-194

    For capacity expansion of the Quasi-Zenith Satellite System (QZSS) safety confirmation system, frame slotted ALOHA with flag method has previously been proposed as an access control scheme. While it is always able to communicate in an optimum state, its maximum channel efficiency is only 36.8%. In this paper, we propose adding a reservation channel (R-Ch) to the frame slotted ALOHA with flag method to increase the upper limit of the channel efficiency. With an R-Ch, collision due to random channel selection is decreased by selecting channels in multiple steps, and the channel efficiency is improved up to 84.0%. The time required for accommodating 3 million mobile terminals, each sending one message, when using the flag method only and the flag method with an R-Ch are compared. It is shown that the accommodating time can be reduced to less than half by adding an R-Ch to the flag method.

  • Signaling Based Discard with Flags: Per-Flow Fairness in Ring Aggregation Networks

    Yu NAKAYAMA  Ken-Ichi SUZUKI  Jun TERADA  Akihiro OTAKA  

     
    PAPER-Network

      Vol:
    E98-B No:12
      Page(s):
    2431-2438

    Ring aggregation networks are widely employed for metro access networks. A layer-2 ring with Ethernet Ring Protection is a popular topology for carrier services. Since frames are forwarded along ring nodes, a fairness scheme is required to achieve throughput fairness. Although per-node fairness algorithms have been developed for the Resilient Packet Ring, the per-node fairness is insufficient if there is bias in a flow distribution. To achieve per-flow fairness, N Rate N+1 Color Marking (NRN+1CM) was proposed. However, NRN+1CM can achieve fairness in case there are sufficient numbers of available bits on a frame header. It cannot be employed if the frame header cannot be overwritten. Therefore, the application range of NRN+1CM is limited. This paper proposes a Signaling based Discard with Flags (SDF) scheme for per-flow fairness. The objective of SDF is to eliminate the drawback of NRN+1CM. The key idea is to attach a flag to frames according to the input rate and to discard them selectively based on the flags and a dropping threshold. The flag is removed before the frame is transmitted to another node. The dropping threshold is cyclically updated by signaling between ring nodes and a master node. The SDF performance was confirmed by employing a theoretical analysis and computer simulations. The performance of SDF was comparable to that of NRN+1CM. It was verified that SDF can achieve per-flow throughput fairness without using a frame header in ring aggregation networks.

  • Early Termination of CU Encoding to Reduce HEVC Complexity

    Ryeong-hee GWEON  Yung-Lyul LEE  

     
    LETTER-Image

      Vol:
    E95-A No:7
      Page(s):
    1215-1218

    The next generation video coding standard HEVC shows high coding performance compared with the H.264/AVC standard, but the computational complexity of the HEVC encoder (HM3.0) is significantly higher. In this letter, the early termination of the CU encoding algorithm is proposed to reduce the computational complexity in the HEVC encoder. The proposed method reduces the encoder complexity by 58.7%, while maintaining the same level of coding efficiency.

  • Issue Mechanism for Embedded Simultaneous Multithreading Processor

    Chengjie ZANG  Shigeki IMAI  Steven FRANK  Shinji KIMURA  

     
    PAPER

      Vol:
    E91-A No:4
      Page(s):
    1092-1100

    Simultaneous Multithreading (SMT) technology enhances instruction throughput by issuing multiple instructions from multiple threads within one clock cycle. For in-order pipeline to each thread, SMT processors can provide large number of issued instructions close to or surpass than using out-of-order pipeline. In this work, we show an efficient issue logic for predicated instruction sequence with the parallel flag in each instruction, where the predicate register based issue control is adopted and the continuous instructions with the parallel flag of '0' are executed in parallel. The flag is pre-defined by a compiler. Instructions from different threads are issued based on the round-robin order. We also introduce an Instruction Queue skip mechanism for thread if the queue is empty. Using this kind of issue logic, we designed a 6 threads, 7-stage, in-order pipeline processor. Based on this processor, we compare round-robin issue policy (RR(T1-Tn)) with other policies: thread one always has the highest priority (PR(T1)) and thread one or thread n has the highest priority in turn (PR(T1-Tn)). The results show that RR(T1-Tn) policy outperforms others and PR(T1-Tn) is almost the same to RR(T1-Tn) from the point of view of the issued instructions per cycle.

  • An Image Compression Algorithm Based on Dynamically Stratifying Submatrices and Vector Space

    Tianxing LIU  Hideo KURODA  

     
    LETTER-Multimedia Systems

      Vol:
    E84-B No:7
      Page(s):
    1973-1976

    In this paper, we present an image compression algorithm using two concepts, subdividing an image matrix and stratifying submatrices into FD-submatrices (feature distribution submatrices). According to the feature distribution and the view that an image can be decomposed into some feature layers, we generate a compression tree by setting up a logic process of decomposition and stratification. To get better compression ratios, the set of submatrices having one and zero as elements, including logic flag sequences is compressed by vector space theory.

  • Analysis of TCP Flags in Congested Network

    Masaki FUKUSHIMA  Shigeki GOTO  

     
    PAPER

      Vol:
    E83-D No:5
      Page(s):
    996-1002

    This paper proposes a new simple method for network measurement. It extracts 6-bit control flags of TCP (Transmission Control Protocol) packets. The idea is based on the unique feature of flag ratios which is discovered by our exhaustive search for the new indexes of network traffic. By the use of flag ratios, one can tell if the network is really congested. It is much simpler than the conventional network monitoring by a network analyzer. The well-known monitoring method is based on the utilization parameter of a communication circuit which ranges from 0% to 100%. One cannot tell the line is congested even if the factor is 100%. 100% means full utilization and does not give any further information. To calculate the real performance of the network, one should estimate the throughput or effective speed of each user. The estimation needs much calculation. Our new method tries to correlate ratios of TCP control flags and network congestion. The result shows the usefulness of this new method. This paper analyzes the reason why the flag ratios show the unique feature.