Search For:

Displaying 1-5 out of 5 total
Synthesizing Tiled Matrix Decomposition on FPGAs
Found in: International Conference on Field Programmable Logic and Applications
By Yi-Gang Tai,Kleanthis Psarris,Chia-Tien Dan Lo
Issue Date:September 2011
pp. 464-469
Hardware accelerators such as FPGAs and GPUs in heterogeneous systems are being increasingly important for many applications. For high performance computing, the flexibility and efficiency of FPGA makes it an attractive alternative to other approaches. How...
Accelerating Matrix Operations with Improved Deeply Pipelined Vector Reduction
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yi-Gang Tai,Chia-Tien Dan Lo,Kleanthis Psarris
Issue Date:February 2012
pp. 202-210
Many scientific or engineering applications involve matrix operations, in which reduction of vectors is a common operation. If the core operator of the reduction is deeply pipelined, which is usually the case, dependencies between the input data elements c...
Accelerating matrix decomposition with replications
Found in: Parallel and Distributed Processing Symposium, International
By Yi-Gang Tai, Chia-Tien Dan Lo, Kleanthis Psarris
Issue Date:April 2008
pp. 1-8
Matrix decomposition applications that involve large matrix operations can take advantage of the flexibility and adaptability of reconfigurable computing systems to improve performance. The benefits come from replication, which includes vertical replicatio...
Space Optimization on Counters for FPGA-Based Perl Compatible Regular Expressions
Found in: ACM Transactions on Reconfigurable Technology and Systems (TRETS)
By Chia-Tien Dan Lo, Yi-Gang Tai
Issue Date:September 2009
pp. 1-18
With their expressiveness and simplicity, Perl compatible regular expressions (PCREs) have been adopted in mainstream signature based network intrusion detection systems (NIDSs) to describe known attack signatures, especially for polymorphic worms. NIDSs r...
Hardware implementation for network intrusion detection rules with regular expression support
Found in: Proceedings of the 2008 ACM symposium on Applied computing (SAC '08)
By Chia-Tien Dan Lo, Kleanthis Psarris, Yi-Gang Tai
Issue Date:March 2008
pp. 28-34
Signature-based network intrusion detection systems (NIDSs), such as Snort and Bro, rely on a rule database that describes traffic patterns for known attacks. They examine each packets flowing through a network segment and report suspicious packets to assu...