Skip to main content

Showing 1–9 of 9 results for author: Jha, C K

  1. arXiv:2407.02921  [pdf, other

    cs.ET

    In-Memory Mirroring: Cloning Without Reading

    Authors: Simranjeet Singh, Ankit Bende, Chandan Kumar Jha, Vikas Rana, Rolf Drechsler, Sachin Patkar, Farhad Merchant

    Abstract: In-memory computing (IMC) has gained significant attention recently as it attempts to reduce the impact of memory bottlenecks. Numerous schemes for digital IMC are presented in the literature, focusing on logic operations. Often, an application's description has data dependencies that must be resolved. Contemporary IMC architectures perform read followed by write operations for this purpose, which… ▽ More

    Submitted 4 July, 2024; v1 submitted 3 July, 2024; originally announced July 2024.

    Comments: Accepted in IFIP/IEEE VLSI-SoC 2024

  2. arXiv:2310.10460  [pdf, other

    cs.ET

    Experimental Validation of Memristor-Aided Logic Using 1T1R TaOx RRAM Crossbar Array

    Authors: Ankit Bende, Simranjeet Singh, Chandan Kumar Jha, Tim Kempen, Felix Cüppers, Christopher Bengel, Andre Zambanini, Dennis Nielinger, Sachin Patkar, Rolf Drechsler, Rainer Waser, Farhad Merchant, Vikas Rana

    Abstract: Memristor-aided logic (MAGIC) design style holds a high promise for realizing digital logic-in-memory functionality. The ability to implement a specific gate in a MAGIC design style hinges on the SET-to-RESET threshold ratio. The TaOx memristive devices exhibit distinct SET-to-RESET ratios, enabling the implementation of OR and NOT operations. As the adoption of the MAGIC design style gains moment… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Comments: Accepted in VLSID 2024

  3. arXiv:2309.04868  [pdf, other

    cs.ET cs.LO

    MemSPICE: Automated Simulation and Energy Estimation Framework for MAGIC-Based Logic-in-Memory

    Authors: Simranjeet Singh, Chandan Kumar Jha, Ankit Bende, Vikas Rana, Sachin Patkar, Rolf Drechsler, Farhad Merchant

    Abstract: Existing logic-in-memory (LiM) research is limited to generating mappings and micro-operations. In this paper, we present~\emph{MemSPICE}, a novel framework that addresses this gap by automatically generating both the netlist and testbench needed to evaluate the LiM on a memristive crossbar. MemSPICE goes beyond conventional approaches by providing energy estimation scripts to calculate the precis… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

    Comments: Accepted in ASP-DAC 2024

  4. arXiv:2307.03669  [pdf, other

    cs.ET

    Should We Even Optimize for Execution Energy? Rethinking Mapping for MAGIC Design Style

    Authors: Simranjeet Singh, Chandan Kumar Jha, Ankit Bende, Phrangboklang Lyngton Thangkhiew, Vikas Rana, Sachin Patkar, Rolf Drechsler, Farhad Merchant

    Abstract: Memristor-based logic-in-memory (LiM) has become popular as a means to overcome the von Neumann bottleneck in traditional data-intensive computing. Recently, the memristor-aided logic (MAGIC) design style has gained immense traction for LiM due to its simplicity. However, understanding the energy distribution during the design of logic operations within the memristive memory is crucial in assessin… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

    Comments: Accepted to published in IEEE EMBEDDED SYSTEMS LETTER

  5. arXiv:2304.13552  [pdf, other

    cs.ET

    Finite State Automata Design using 1T1R ReRAM Crossbar

    Authors: Simranjeet Singh, Omar Ghazal, Chandan Kumar Jha, Vikas Rana, Rolf Drechsler, Rishad Shafik, Alex Yakovlev, Sachin Patkar, Farhad Merchant

    Abstract: Data movement costs constitute a significant bottleneck in modern machine learning (ML) systems. When combined with the computational complexity of algorithms, such as neural networks, designing hardware accelerators with low energy footprint remains challenging. Finite state automata (FSA) constitute a type of computation model used as a low-complexity learning unit in ML systems. The implementat… ▽ More

    Submitted 30 June, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: Accepted by 21st IEEE Interregional NEWCAS Conference 2023 (NEWCAS 2023)

  6. arXiv:2208.05294  [pdf, other

    cs.AR

    A Fresh Perspective on DNN Accelerators by Performing Holistic Analysis Across Paradigms

    Authors: Tom Glint, Chandan Kumar Jha, Manu Awasthi, Joycee Mekie

    Abstract: Traditional computers with von Neumann architecture are unable to meet the latency and scalability challenges of Deep Neural Network (DNN) workloads. Various DNN accelerators based on Conventional compute Hardware Accelerator (CHA), Near-Data-Processing (NDP) and Processing-in-Memory (PIM) paradigms have been proposed to meet these challenges. Our goal in this work is to perform a rigorous compari… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

  7. arXiv:2105.07432  [pdf, other

    cs.AR

    Zero Aware Configurable Data Encoding by Skipping Transfer for Error Resilient Applications

    Authors: Chandan Kumar Jha, Shreyas Singh, Riddhi Thakker, Manu Awasthi, Joycee Mekie

    Abstract: In this paper, we propose Zero Aware Configurable Data Encoding by Skipping Transfer (ZAC-DEST), a data encoding scheme to reduce the energy consumption of DRAM channels, specifically targeted towards approximate computing and error resilient applications. ZAC-DEST exploits the similarity between recent data transfers across channels and information about the error resilience behavior of applicati… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

  8. arXiv:1407.2423  [pdf

    cs.CR

    Desiging a logical security framework for e-commerce system based on soa

    Authors: Ashish Kr. Luhach, Sanjay K. Dwivedi, C. K. Jha

    Abstract: Rapid increases in information technology also changed the existing markets and transformed them into e- markets (e-commerce) from physical markets. Equally with the e-commerce evolution, enterprises have to recover a safer approach for implementing E-commerce and maintaining its logical security. SOA is one of the best techniques to fulfill these requirements. SOA holds the vantage of being easy… ▽ More

    Submitted 9 July, 2014; originally announced July 2014.

  9. arXiv:1407.2421  [pdf

    cs.CR cs.CY

    Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    Authors: Ashish Kr. Luhach, Sanjay K Dwivedi, C K Jha

    Abstract: Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and… ▽ More

    Submitted 9 July, 2014; originally announced July 2014.