29 Search Results for "Probst, Christian W."


Document
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)

Authors: Tyler W. Moore, Christian W. Probst, Kai Rannenberg, and Michel van Eeten

Published in: Dagstuhl Reports, Volume 6, Issue 11 (2017)


Abstract
This report documents the program and the outcomes of Dagstuhl Seminar 16461 "Assessing ICT Security Risks in Socio-Technical Systems". As we progress from classic mechanical or electrical production systems, over ICT systems, to socio-technical systems, risk assessment becomes increasingly complex and difficult. Risk assessment for traditional engineering systems assumes the systems to be deterministic. In non-deterministic systems, standard procedure is to fix those factors that are not deterministic. These techniques do not scale to ICT systems where many risks are hard to trace due to the immaterial nature of information. Beyond ICT systems, socio-technical systems also contain human actors as integral parts of the system. In such socio-technical systems there may occur unforeseen interactions between the system, the environment, and the human actors, especially insiders. Assessing ICT security risks for socio-technical systems and their economic environment requires methods and tools that integrate relevant socio-technical security metrics. In this seminar we investigated systematic methods and tools to estimate those ICT security risks in socio-technical systems and their economic environment. In particular, we searched for novel security risk assessment methods that integrate different types of socio-technical security metrics.

Cite as

Tyler W. Moore, Christian W. Probst, Kai Rannenberg, and Michel van Eeten. Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). In Dagstuhl Reports, Volume 6, Issue 11, pp. 63-89, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2017)


Copy BibTex To Clipboard

@Article{moore_et_al:DagRep.6.11.63,
  author =	{Moore, Tyler W. and Probst, Christian W. and Rannenberg, Kai and van Eeten, Michel},
  title =	{{Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)}},
  pages =	{63--89},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2017},
  volume =	{6},
  number =	{11},
  editor =	{Moore, Tyler W. and Probst, Christian W. and Rannenberg, Kai and van Eeten, Michel},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.6.11.63},
  URN =		{urn:nbn:de:0030-drops-70390},
  doi =		{10.4230/DagRep.6.11.63},
  annote =	{Keywords: economics of risk assessment, human factor, return on security investment, security risk management, socio-technical security}
}
Document
Secure Architectures in the Cloud (Dagstuhl Seminar 11492)

Authors: Sabrina De Capitani di Vimercati, Wolter Pieters, and Christian W. Probst

Published in: Dagstuhl Reports, Volume 1, Issue 12 (2012)


Abstract
This report documents the outcomes of Dagstuhl Seminar 11492 ``Secure Architectures in the Cloud''. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces the burden of the owners in managing their data, and may provide significant cost savings. However, cloud computing introduces new security and privacy concerns. In fact, there is little consensus on how to guarantee the confidentiality, integrity, and availability of data in cloud computing scenarios. Also, it is unclear to what extent parties can be held accountable in case something goes wrong. In this seminar, we searched for architectures, modelling approaches, and mechanisms that can help in providing guarantees for cloud security. We proposed the concept of verification-as-a-service that can guide architectures for verification of cloud architectures and configurations, as well as results of computations. We also proposed architectures for organising customisability of security and privacy for cloud customers.

Cite as

Sabrina De Capitani di Vimercati, Wolter Pieters, and Christian W. Probst. Secure Architectures in the Cloud (Dagstuhl Seminar 11492). In Dagstuhl Reports, Volume 1, Issue 12, pp. 11-26, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)


Copy BibTex To Clipboard

@Article{decapitanidivimercati_et_al:DagRep.1.12.11,
  author =	{De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W.},
  title =	{{Secure Architectures in the Cloud (Dagstuhl Seminar 11492)}},
  pages =	{11--26},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2012},
  volume =	{1},
  number =	{12},
  editor =	{De Capitani di Vimercati, Sabrina and Pieters, Wolter and Probst, Christian W.},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.1.12.11},
  URN =		{urn:nbn:de:0030-drops-33843},
  doi =		{10.4230/DagRep.1.12.11},
  annote =	{Keywords: attestation, auditing, cloud computing, security architectures, security modelling, verification}
}
Document
Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach

Authors: Martin Schoeberl, Pascal Schleuniger, Wolfgang Puffitsch, Florian Brandner, and Christian W. Probst

Published in: OASIcs, Volume 18, Bringing Theory to Practice: Predictability and Performance in Embedded Systems (2011)


Abstract
Current processors are optimized for average case performance, often leading to a high worst-case execution time (WCET). Many architectural features that increase the average case performance are hard to be modeled for the WCET analysis. In this paper we present Patmos, a processor optimized for low WCET bounds rather than high average case performance. Patmos is a dual-issue, statically scheduled RISC processor. The instruction cache is organized as a method cache and the data cache is organized as a split cache in order to simplify the cache WCET analysis. To fill the dual-issue pipeline with enough useful instructions, Patmos relies on a customized compiler. The compiler also plays a central role in optimizing the application for the WCET instead of average case performance.

Cite as

Martin Schoeberl, Pascal Schleuniger, Wolfgang Puffitsch, Florian Brandner, and Christian W. Probst. Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach. In Bringing Theory to Practice: Predictability and Performance in Embedded Systems. Open Access Series in Informatics (OASIcs), Volume 18, pp. 11-21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)


Copy BibTex To Clipboard

@InProceedings{schoeberl_et_al:OASIcs.PPES.2011.11,
  author =	{Schoeberl, Martin and Schleuniger, Pascal and Puffitsch, Wolfgang and Brandner, Florian and Probst, Christian W.},
  title =	{{Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach}},
  booktitle =	{Bringing Theory to Practice: Predictability and Performance in Embedded Systems},
  pages =	{11--21},
  series =	{Open Access Series in Informatics (OASIcs)},
  ISBN =	{978-3-939897-28-6},
  ISSN =	{2190-6807},
  year =	{2011},
  volume =	{18},
  editor =	{Lucas, Philipp and Wilhelm, Reinhard},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.PPES.2011.11},
  URN =		{urn:nbn:de:0030-drops-30774},
  doi =		{10.4230/OASIcs.PPES.2011.11},
  annote =	{Keywords: Time-predictable architecture, WCET analysis, WCET-aware compilation}
}
Document
10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response

Authors: Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 10341, Insider Threats: Strategies for Prevention, Mitigation, and Response (2010)


Abstract
From August 22 to 26, 2010, the Dagstuhl Seminar 10341 ``Insider Threats: Strategies for Prevention, Mitigation, and Response'' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response. In Insider Threats: Strategies for Prevention, Mitigation, and Response. Dagstuhl Seminar Proceedings, Volume 10341, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{bishop_et_al:DagSemProc.10341.1,
  author =	{Bishop, Matt and Coles-Kemp, Lizzie and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
  title =	{{10341 Abstracts Collection – Insider Threats: Strategies for Prevention, Mitigation, and Response}},
  booktitle =	{Insider Threats: Strategies for Prevention, Mitigation, and Response},
  pages =	{1--12},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10341},
  editor =	{Matt Bishop and Lizzie Coles-Kemp and Dieter Gollmann and Jeff Hunker and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10341.1},
  URN =		{urn:nbn:de:0030-drops-29046},
  doi =		{10.4230/DagSemProc.10341.1},
  annote =	{Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Document
10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response

Authors: Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 10341, Insider Threats: Strategies for Prevention, Mitigation, and Response (2010)


Abstract
This article summarizes the objectives and structure of a seminar with the same title, held from August 22nd to 26th, 2010, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from quite diverse communities, to make progress towards an integrated framework for understanding insider threats and their interaction with organizations and policies. During the seminar, social and organizational factors relevant to insider threats, were discussed, as well as urgent questions in four areas: synthesizing social science and technical research, metrics and assurance, language formulations and ontology, and the threats facing intangible systems. This report gives an overview of the discussions and presentations during the week, as well as the outcome of these discussions.

Cite as

Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response. In Insider Threats: Strategies for Prevention, Mitigation, and Response. Dagstuhl Seminar Proceedings, Volume 10341, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)


Copy BibTex To Clipboard

@InProceedings{bishop_et_al:DagSemProc.10341.2,
  author =	{Bishop, Matt and Coles-Kemp, Lizzie and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
  title =	{{10341 Report – Insider Threats: Strategies for Prevention, Mitigation, and Response}},
  booktitle =	{Insider Threats: Strategies for Prevention, Mitigation, and Response},
  pages =	{1--13},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2010},
  volume =	{10341},
  editor =	{Matt Bishop and Lizzie Coles-Kemp and Dieter Gollmann and Jeff Hunker and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.10341.2},
  URN =		{urn:nbn:de:0030-drops-29033},
  doi =		{10.4230/DagSemProc.10341.2},
  annote =	{Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Document
08302 Abstracts Collection – Countering Insider Threats

Authors: Matt Bishop, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
From July 20 to July 25, 2008, the Dagstuhl Seminar 08302 ``Countering Insider Threats '' was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available.

Cite as

Matt Bishop, Dieter Gollmann, Jeffrey Hunker, and Christian W. Probst. 08302 Abstracts Collection – Countering Insider Threats. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{bishop_et_al:DagSemProc.08302.1,
  author =	{Bishop, Matt and Gollmann, Dieter and Hunker, Jeffrey and Probst, Christian W.},
  title =	{{08302 Abstracts Collection – Countering Insider Threats}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--10},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.1},
  URN =		{urn:nbn:de:0030-drops-17960},
  doi =		{10.4230/DagSemProc.08302.1},
  annote =	{Keywords: Insider Threat, Security Policies, Threat Modelling}
}
Document
08302 Summary – Countering Insider Threats

Authors: Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
This article summarizes the objectives and structure of a seminar with the same title, held from July 20th to July 25th, 2008, at Schloss Dagstuhl, Germany. The seminar brought together researchers and policy-makers from all involved communities, to clarify what it is that identifies an insider threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome of these discussions.

Cite as

Christian W. Probst, Jeffrey Hunker, Matt Bishop, and Dieter Gollmann. 08302 Summary – Countering Insider Threats. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{probst_et_al:DagSemProc.08302.2,
  author =	{Probst, Christian W. and Hunker, Jeffrey and Bishop, Matt and Gollmann, Dieter},
  title =	{{08302 Summary – Countering Insider Threats}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--18},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.2},
  URN =		{urn:nbn:de:0030-drops-17937},
  doi =		{10.4230/DagSemProc.08302.2},
  annote =	{Keywords: Insider threat, workshop report}
}
Document
Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality

Authors: Ulrich Flegel, Florian Kerschbaum, and Richard Wacker

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
In this paper we investigate the privacy dimension of collaborative fraud detection envisioned for outsourcing scenarios. Firstly, we investigate the privacy requirements derived from privacy law and present the resulting judicial argument for pseudonymizing audit data generated for the purpose of fraud detection. Second, we summarize the requirements for such pseudonymization derived from the requirements of the misuse detection approach for fraud detection. Third, we describe our approach for pseudonymization of audit data and two approaches for hiding timestamps in audit data.

Cite as

Ulrich Flegel, Florian Kerschbaum, and Richard Wacker. Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{flegel_et_al:DagSemProc.08302.3,
  author =	{Flegel, Ulrich and Kerschbaum, Florian and Wacker, Richard},
  title =	{{Collaborative Fraud Detection in Outsourcing Scenarios: Issues of and Solutions for Privacy and Confidentiality}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--5},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.3},
  URN =		{urn:nbn:de:0030-drops-17947},
  doi =		{10.4230/DagSemProc.08302.3},
  annote =	{Keywords: Insider threat; occupational fraud; privacy law; PET; logical clocks, pseudonyms,}
}
Document
Fraud Detection from a Business Perspective: Future Directions and Challenges

Authors: Ulrich Flegel, Julien Vayssière, and Gunter Bitz

Published in: Dagstuhl Seminar Proceedings, Volume 8302, Countering Insider Threats (2008)


Abstract
This contribution summarizes the state of the art of fraud detection in practice and shows the relations between the technology for fraud detection and intrusion detection. We identify prospective directions for further investigation and imminent challenges.

Cite as

Ulrich Flegel, Julien Vayssière, and Gunter Bitz. Fraud Detection from a Business Perspective: Future Directions and Challenges. In Countering Insider Threats. Dagstuhl Seminar Proceedings, Volume 8302, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)


Copy BibTex To Clipboard

@InProceedings{flegel_et_al:DagSemProc.08302.4,
  author =	{Flegel, Ulrich and Vayssi\`{e}re, Julien and Bitz, Gunter},
  title =	{{Fraud Detection from a Business Perspective: Future Directions and Challenges}},
  booktitle =	{Countering Insider Threats},
  pages =	{1--3},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2008},
  volume =	{8302},
  editor =	{Matt Bishop and Dieter Gollmann and Jeffrey Hunke and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.08302.4},
  URN =		{urn:nbn:de:0030-drops-17956},
  doi =		{10.4230/DagSemProc.08302.4},
  annote =	{Keywords: Insider threat, occupational fraud, privacy law, PET, logical clocks, pseudonyms}
}
Document
07041 Abstracts Collection – Power-aware Computing Systems

Authors: Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
From January 21, 2007 to January 26, 2007, the Dagstuhl Seminar 07041``Power-aware Computing Systems'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and discussed ongoing work and open problems. This report compiles abstracts of the seminar presentations as well as the seminar results and ideas, providing hyperlinks to full papers wherever possible.

Cite as

Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst. 07041 Abstracts Collection – Power-aware Computing Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{benini_et_al:DagSemProc.07041.1,
  author =	{Benini, Luca and Chang, Naehyuck and Kremer, Ulrich and Probst, Christian W.},
  title =	{{07041 Abstracts Collection – Power-aware Computing Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--14},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.1},
  URN =		{urn:nbn:de:0030-drops-11248},
  doi =		{10.4230/DagSemProc.07041.1},
  annote =	{Keywords: Power consumption, energy reduction, compilers, microarchitectures, simulations, experimental frameworks}
}
Document
07041 Summary – Power-aware Computing Systems

Authors: Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
The program of the Dagstuhl seminar 07041 on Power-aware Computing Systems featured presentations of about 25 participating researchers from academia and industry. They were chosen to represent major areas in targeting the energy consumption of a computing system – Applications, Compilers, Virtual-execution Environments, Operating Systems, and Hardware. In order to continue the work of the predecessor Dagstuhl seminar held in 2005, the results of that seminar [1] were discussed, with the aim of developing a vision of challenges, problems, and research activities in some of the key areas identified in 2005. The first part of the seminar was dedicated to lively discussions that led to the identification of three areas that were considered being most interesting. As a result, three groups were formed to further identify challenges and opportunities. The results of these groups are presented in this report. In addition, abstracts of the presentations as well as work-in-progress papers are published in these proceedings.

Cite as

Luca Benini, Naehyuck Chang, Ulrich Kremer, and Christian W. Probst. 07041 Summary – Power-aware Computing Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{benini_et_al:DagSemProc.07041.2,
  author =	{Benini, Luca and Chang, Naehyuck and Kremer, Ulrich and Probst, Christian W.},
  title =	{{07041 Summary – Power-aware Computing Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--7},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.2},
  URN =		{urn:nbn:de:0030-drops-11232},
  doi =		{10.4230/DagSemProc.07041.2},
  annote =	{Keywords: Power-aware Computing Systems, Low-power Design, Parallelism and Power Consumption}
}
Document
07041 Working Group – Towards Interfaces for Integrated Performance and Power Analysis and Simulation

Authors: Chris Bleakley, Tom Clerckx, Harald Devos, Matthias Grumer, Alex Janek, Ulrich Kremer, Christian W. Probst, Phillip Stanley-Marbell, Christian Steger, Vasanth Venkatachalam, and Manuel Wendt

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
In the design and optimization of power-aware computing systems, it is often desired to estimate power consumption at various levels of abstraction, e.g., at the transistor, gate, RTL, behavioral or transaction levels. Tools for power estimation at these different levels of abstraction require specialized expertise, e.g., understanding of device physics for circuit-level power estimation, and as such are necessarily developed by different research communities. In the optimization of complete platforms however, it is desired to be able to obtain aggregate power and performance estimates for the different components of a system, and this requires the ability to model the system at a mixture of levels of abstraction. One approach to enabling such cross-abstraction modeling, is to define a mechanism for interchange of data between tools at different layers of abstraction, for both static analysis and simulation-based studies. This document presents preliminary discussions on the requirements of such an interface.

Cite as

Chris Bleakley, Tom Clerckx, Harald Devos, Matthias Grumer, Alex Janek, Ulrich Kremer, Christian W. Probst, Phillip Stanley-Marbell, Christian Steger, Vasanth Venkatachalam, and Manuel Wendt. 07041 Working Group – Towards Interfaces for Integrated Performance and Power Analysis and Simulation. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{bleakley_et_al:DagSemProc.07041.3,
  author =	{Bleakley, Chris and Clerckx, Tom and Devos, Harald and Grumer, Matthias and Janek, Alex and Kremer, Ulrich and Probst, Christian W. and Stanley-Marbell, Phillip and Steger, Christian and Venkatachalam, Vasanth and Wendt, Manuel},
  title =	{{07041 Working Group – Towards Interfaces for Integrated Performance and Power Analysis and Simulation}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--6},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.3},
  URN =		{urn:nbn:de:0030-drops-11072},
  doi =		{10.4230/DagSemProc.07041.3},
  annote =	{Keywords: Power Estimation Tools, Simulation, Tool Interfaces}
}
Document
Automist - A Tool for Automated Instruction Set Characterization of Embedded Processors

Authors: Manuel Wendt, Matthias Grumer, Christian Steger, and Ulrich Neffe

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
The steadily increasing performance of mobile devices also implies a rise in power consumption. To counteract this trend it is mandatory to accomplish software power optimizations based on accurate power consumption models characterized for the processor. This paper presents an environment for automated instruction set characterization based on physical power measurements. Based on a detailed instruction set description a testbench generator creates all needed test programs for a complete characterization. Afterwards those programs are executed by the processor and the energy consumption is measured. For an accurate energy measurement a high performance sampling technique has been established, which can be either clock or energy driven.

Cite as

Manuel Wendt, Matthias Grumer, Christian Steger, and Ulrich Neffe. Automist - A Tool for Automated Instruction Set Characterization of Embedded Processors. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{wendt_et_al:DagSemProc.07041.4,
  author =	{Wendt, Manuel and Grumer, Matthias and Steger, Christian and Neffe, Ulrich},
  title =	{{Automist - A Tool for Automated Instruction Set Characterization of Embedded Processors}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--10},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.4},
  URN =		{urn:nbn:de:0030-drops-11097},
  doi =		{10.4230/DagSemProc.07041.4},
  annote =	{Keywords: Software energy estimation, automated processor characterization, testbench generator, current measurement, clock driven sampling, energy driven sampl}
}
Document
Compiler-based Software Power Peak Elimination on Smart Card Systems

Authors: Matthias Grumer, Manuel Wendt, Christian Steger, Reinhold Weiss, Ulrich Neffe, and Andreas Muehlberger

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
RF-powered smart cards are widely used in different application areas today. For smart cards not only performance is an important attribute, but also the power consumed by a given application. The power consumed is heavily depending on the software executed on the system. The power profile, especially the power peaks, of an executed application influence the system stability and security. Flattening the power profile can thus increase the stability and security of a system. In this paper we present an optimization system that allows a reduction of power peaks based on a compiler optimization. The optimizations are done on different levels of the compiler. In the backend of the compiler we present new instruction scheduling algorithms. On the intermediate language level we propose the use of iterative compiling for reducing critical peaks.

Cite as

Matthias Grumer, Manuel Wendt, Christian Steger, Reinhold Weiss, Ulrich Neffe, and Andreas Muehlberger. Compiler-based Software Power Peak Elimination on Smart Card Systems. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{grumer_et_al:DagSemProc.07041.5,
  author =	{Grumer, Matthias and Wendt, Manuel and Steger, Christian and Weiss, Reinhold and Neffe, Ulrich and Muehlberger, Andreas},
  title =	{{Compiler-based Software Power Peak Elimination on Smart Card Systems}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--9},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.5},
  URN =		{urn:nbn:de:0030-drops-11030},
  doi =		{10.4230/DagSemProc.07041.5},
  annote =	{Keywords: Software power optimization, compiler optimization, peak reduction}
}
Document
Complexity of Scheduling in Synthesizing Hardware from Concurrent Action Oriented Specifications

Authors: Gaurav Singh, S. S. Ravi, Sumit Ahuja, and Sandeep Shukla

Published in: Dagstuhl Seminar Proceedings, Volume 7041, Power-aware Computing Systems (2007)


Abstract
Concurrent Action Oriented Specifications (CAOS) formalism such as Bluespec Inc.'s Bluespec System Verilog (BSV) has been recently shown to be effective for hardware modeling and synthesis. This formalism offers the benefits of automatic handling of concurrency issues in highly concurrent system descriptions, and the associated synthesis algorithms have been shown to produce efficient hardware comparable to those generated from hand-written Verilog/VHDL. These benefits which are inherent in such a synthesis process also aid in faster architectural exploration. This is because CAOS allows a high-level description (above RTL) of a design in terms of atomic transactions, where each transaction corresponds to a collection of operations. Optimal scheduling of such actions in CAOS-based synthesis process is crucial in order to generate hardware that is efficient in terms of area, latency and power. In this paper, we analyze the complexity of the scheduling problems associated with CAOS-based synthesis and discuss several heuristics for meeting the peak power goals of designs generated from CAOS. We also discuss approximability of these problems as appropriate.

Cite as

Gaurav Singh, S. S. Ravi, Sumit Ahuja, and Sandeep Shukla. Complexity of Scheduling in Synthesizing Hardware from Concurrent Action Oriented Specifications. In Power-aware Computing Systems. Dagstuhl Seminar Proceedings, Volume 7041, pp. 1-25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)


Copy BibTex To Clipboard

@InProceedings{singh_et_al:DagSemProc.07041.6,
  author =	{Singh, Gaurav and Ravi, S. S. and Ahuja, Sumit and Shukla, Sandeep},
  title =	{{Complexity of Scheduling in Synthesizing Hardware from Concurrent Action Oriented Specifications}},
  booktitle =	{Power-aware Computing Systems},
  pages =	{1--25},
  series =	{Dagstuhl Seminar Proceedings (DagSemProc)},
  ISSN =	{1862-4405},
  year =	{2007},
  volume =	{7041},
  editor =	{Luca Benini and Naehyuck Chang and Ulrich Kremer and Christian W. Probst},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07041.6},
  URN =		{urn:nbn:de:0030-drops-11055},
  doi =		{10.4230/DagSemProc.07041.6},
  annote =	{Keywords: Hardware Synthesis, Concurrent Action Oriented Specifications (CAOS), Scheduling, Complexity, Peak Power.}
}
  • Refine by Author
  • 13 Probst, Christian W.
  • 6 Kremer, Ulrich
  • 5 Steger, Christian
  • 4 Benini, Luca
  • 4 Bishop, Matt
  • Show More...

  • Refine by Classification

  • Refine by Keyword
  • 3 Insider Threat
  • 3 Security Policies
  • 3 Threat Modelling
  • 2 Insider threat
  • 2 compiler optimization
  • Show More...

  • Refine by Type
  • 29 document

  • Refine by Publication Year
  • 12 2007
  • 8 2005
  • 4 2008
  • 2 2010
  • 1 2011
  • Show More...

Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail