Computational Neuroscience for Technology: Event-based Vision Sensors and Information Processing
Speaker: Prof. Jörg Conradt
Title: Computational Neuroscience for Technology: Event-based Vision Sensors and Information Processing
Date: Tuesday, June 2, 2015
Time: 3:00 p.m.
Location: Donald Bren Hall 4011
Host: Jeff Krichmar and Nikil Dutt
Abstract:
In recent decades the field of Computer Vision has developed sophisticated algorithms for problems such as object tracking or motion extraction based on sequences of high-resolution camera images. Applying such algorithms in real-time robotics reveals an inherent problem: they typically require high data bandwidth and high processing power, which results in substantial computing machinery and/or delayed processing of data. As part of an optimized biological solution for vision, our brain developed retinal receptor cells that largely respond with asynchronous events (“neural spikes”) to temporal changes of brightness. Such encoding of visual information substantially reduces the amount of transmitted data and simultaneously increases temporal precision.
Recently “silicon retinas” have been developed as specialized vision sensors to provide such neuro-inspired vision input for technical systems. Visual information obtained from these sensors differs substantially from traditional sequences of images, which requires an “event-based” redesign of computer vision algorithms. This talk introduces the neuro-inspired vision sensors and presents event-based algorithms for applications such as real-time computation of optic flow and visual object tracking at high update rates on minimalistic computing hardware.
Design Technologies for Embedded Multiprocessor Systems-on-Chip
Speaker: Prof. Rainer Leupers
Title: Design Technologies for Embedded Multiprocessor Systems-on-Chip
Date: Thursday, April 9, 2015
Time: 11:00am
Location: Harut Barsamian Colloquia Room (Engineering Hall 2430)
Host: Mohammad Al Faruque
Abstract:
The trend towards Multicore and even Manycore architectures affects virtually all areas of computing today. Especially in the mobiles and consumer domains, an extremely high architectural efficiency (MIPS/Watt) is required. In order to manage the complexity of multi-billion transistor IC designs with dozens of heterogeneous processing engines, advanced Electronic System Level (ESL) tools are required. ESL can be roughly subdivided into four categories: architecture modeling and optimization, application SW mapping, simulation and verification, and efficient IP block design. After a general introduction to embedded MPSoC (Multiprocessor Systems-on-Chip) architectures and ESL technologies, this seminar talk will cover selected aspects from the above four domains, in particular ESL power estimation, embedded multicore SW development, fast virtual platforms, and application-specific processor design.
Architectural Support for Security in Emerging Platforms
Speaker: Nael Abu-Ghazaleh
Title: Architectural Support for Security in Emerging Platforms
Date: Wednesday, March 4, 2015
Time: 10:00am
Location: Harut Barsamian Colloquia Room (Engineering Hall 2430)
Host: Fadi Kurdahi
Abstract:
Computer systems are facing a growing threat from increasingly motivated, organized and sophisticated attackers. The problem is complicated by the rapid evolution that computing platforms are experiencing towards mobile and embedded devices, as well as many-core systems, distributed systems, virtualization and clouds. These emerging platforms offer new system and use models and therefore are subject to new vulnerabilities and threat models. This talk motivates the role that computer architecture must play in securing current and emerging systems. I will define this role spanning three primary directions: (1) new security models for protecting not only systems but also applications; (2) architecture support for monitoring to improve resilience to attacks, but also to rapidly detect and contain successful attacks; and (3) Security for emerging architectures. I will animate each of these directions with examples from our recent work.
Towards the Automatic Application and Verification of Countermeasures Against Physical Attacks
Speaker: Francesco Regazzoni
Title: Towards the Automatic Application and Verification of Countermeasures Against Physical Attacks
Date: Tuesday, March 3, 2015
Time: 2:00pm
Location: Donald Bren Hall 3011
Host: Nikil Dutt & Rosario Cammarota
Abstract:
Physical attacks exploit the physical weaknesses of cryptographic devices to reveal the secret information stored on them. Countermeasures against these attacks are often considered only in the later stages of the full design flow, and applied manually by designers with strong security expertise. This approach, however, negatively affects the robustness, the cost, and the production time of secure devices.
In view of this increasingly relevant problem, it is crucial to address the design challenges associated with the proliferation of physical attacks, developing a methodology to automate the design and the verification of secure embedded systems.
This talk focuses on one type of physical attacks, the differential power analysis (DPA), and presents the design and the implementation of the infrastructure needed to enable the automatic application and verification of DPA countermeasures.
Inertial and Bio-potential-based Wearable Computers: Algorithms and Applications
Title: Inertial and Bio-potential-based Wearable Computers: Algorithms and Applications
Speaker: Professor Roozbeh Jafari
Date/Time: Thursday, February 12, 2015, 11:00am to 12:00pm
Location: Donald Bren Hall 4011
Host: Eli Bozorgzadeh
Abstract:
Wearable computers bring to fruition many new opportunities to continuously monitor human body with sensors placed on body; whether they are intended to detect an early onset of a disease, assess human performance or determine the effectiveness of a treatment. In the past few years, the community has observed a large number of applications leveraging wearable computers. There are, however, a number of fundamental challenges that need to be addressed before realizing the true ubiquitous use of the wearable computing systems.
In the first half of the talk, we highlight several inertial-based wearable applications including systems capable of monitoring activities of daily living (ADLs) and home exercises for senior citizen. We focus on a class of signal processing algorithms that provide extreme robustness leveraging accelerometers and gyroscopes. We present our results on ADLs and highlight our efforts in line with data dissemination for the scientific community. In the second half of the presentation, we focus on dry-contact electroencephalography (EEG). We present our brain-computer interface (BCI) system developed for intensive care units leveraging dry-contact EEG. We outline several components of EEG systems and focus on skin-electrode contact noise.
We provide techniques for noise reduction including contact reconfiguration along with experimental verifications. We provide concluding remarks on the trends of wearable computing technology development and future directions.
Design Automation of Things: Power Consumption Characterization, Modeling and Estimation of Electric Vehicles
Title: Design Automation of Things: Power Consumption Characterization, Modeling and Estimation of Electric Vehicles
Speaker: Professor Naehyuck Chang
Date/Time: Tuesday, February 10, 2015, 2:00pm to 3:00pm
Rapid electric vehicle (EV) penetration gives a threatening challenge in electric energy generation. An 1,814 kg curb weight full electric vehicle driving 18,129 km/year consumes electricity energy equivalent to 74% of the total residential electricity use per person in the US. This implies that 27% more nationwide electricity generation is needed when 70% of passenger vehicles are replaced with EVs.
This talk introduces the first step toward systematic EV design-time and runtime optimization. We develop instantaneous power consumption modeling of an EV by the curb weights, speed, acceleration, road slope, passenger and cargo weights, motor capacity, and so on, as a battery discharge model. The model also considers the onboard charger, regenerative braking and so on, as a battery charge model. To insure model fidelity, we fabricate a lightweight custom EV, perform extensive measurement, and derive model coefficients using multivariable regression analysis. We estimate the EV instantaneous power consumption of a given speed and route profiles and verify the estimation fidelity with a real test run data. This talk will also cover the on-going project for the next version electric vehicle with four-wheel drive capability.
Connected Context Computing for Smart IoT
Speaker: Jane Yung-jen Hsu
Title: Connected Context Computing for Smart IoT
Date: Tuesday, February 10, 2015
Time: 3:30pm
Location: Harut Barsamian Colloquia Room (Engineering Hall 2430)
Host: Professor Kwei-Jay Lin
Abstract:
We are witnessing the explosion of connected devices, or the so-called Internet of Things, in our everyday lives. This new trend has created new opportunities to monitor human activities and to configure environments for comfort, security, or energy savings. In the US, buildings account for roughly 40% of total energy usage, with major contributions from the cooling demands. While most people have no intention of wasting energy, they are often unaware of the energy footprint of their daily routines. Activity recognition is a key capability for a smart environment to offer timely services and intelligent interactions with people.
In this talk, I will introduce connected context computing and its significance in enabling our vision of smart IoT. In particular, I will share our experience on monitoring the Computer Science building on NTU campus to improve its air conditioning and space utilization. First, an agent-based HVAC service is designed to analyze cooling demands and wastes. Second, experiments on SweetFeedback are conducted to encourage energy-saving behaviors. Third, crowd sourcing cyber-physical agents are deployed to acquire status labels for activity recognition from people situated in the environment. Â Our experiments showed that context computing, predictive analytics, and proactive control are the fundamental building blocks for a smart IoT framework that can SCALE (Sense, Communicate, Analyze, Learn, Expect and Effect).
Evaluating GALS Systems for System Integration-Outlook and Future Prospects
Speaker: Dr. Milos Krstic Date: Friday May 17, 2013 Time: 2:00pm – 3:00pm Location: Donald Bren Hall 4011
Models and Architectures for Heterogeneous System Design
Speaker: Prof. Andreas Gerstlauer, University of Texas, Austin Title: Models and Architectures for Heterogeneous System Design Date: Monday, May 6, 2013 Time: 11:00am – 12:00pm Location: Harut Barsamian Colloquia Room (2430 Engineering Hall)
Functionality, Performance, and Power Consumption Challenges in Smartphones
Speaker: Prof. Sung-Soo Lim, Kookmin University, South Korea Title: Functionality, Performance, and Power Consumption Challenges in Smartphones Date: Friday, April 12, 2013 Time: 11:00am – 12:00pm Location: Donald Bren Hall 6011
Speaker: Prof. Stephan Wong, Computer Engineering Laboratory, Delft University of Technology, Netherlands Title: The Delft Reconfigurable VLIW Processor Date: Tuesday, March 26, 2013 Time: 2:00pm – 3:00pm Location: 2111 Engineering Hall
A Thermal Perspective of Dependability in Systems on Chip
Speaker: Prof. Jörg Henkel, Karlsruhe Institute of Technology, Germany Location: Harut Barsamian Colloquia Room (EH 2430) Date/Time: Monday, February 25, 2013, 11:00am to 12:00pm View Details
Cyber-Physical Systems at Small and Large Scales
Speaker: Prof. Marilyn Wolf, Georgia Institute of Technology
Location: 4011 Donal Bren Hall
Date/Time: Friday, September 28, 2012, 2:00-3:00PM
View Details
Flexible Error Handling for Resource-Constrained Embedded Systems
Speaker: Dr. Michael Engel, TU Dortmund University, Germany
Location: 2430 Engineering Hall
Date/Time: Friday, August 31, 2012, 2:30-4:00PM
View Details
Addressing Supply Chain Security with Split Manufacturing
Dr. Ted Huffmire
Naval Postgraduate School, Monterey, CA
DBH 3011
Seminar, June 27, 2012read more »