2019 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2019
DOI: 10.23919/date.2019.8715108
|View full text |Cite
|
Sign up to set email alerts
|

Near-Data Acceleration of Privacy-Preserving Biomarker Search with 3D-Stacked Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…This case study aims to analyze when a workload can benefit from different core models and numbers of cores while respecting the area and power envelope of the logic layer of a 3D-stacked memory. Many prior works employ 3D-stacked memories as the substrate to implement NDP architectures [1,46]- [48,54,55,59]- [61,63]- [70,74]- [77,79,80,99,101]- [103,137,146,192,194,305,316]- [324]. However, 3D-stacked memories impose severe area and power restrictions on NDP architectures.…”
Section: Case Study 3: Impact Of Different Core Models On Ndp Architecturesmentioning
confidence: 99%
“…This case study aims to analyze when a workload can benefit from different core models and numbers of cores while respecting the area and power envelope of the logic layer of a 3D-stacked memory. Many prior works employ 3D-stacked memories as the substrate to implement NDP architectures [1,46]- [48,54,55,59]- [61,63]- [70,74]- [77,79,80,99,101]- [103,137,146,192,194,305,316]- [324]. However, 3D-stacked memories impose severe area and power restrictions on NDP architectures.…”
Section: Case Study 3: Impact Of Different Core Models On Ndp Architecturesmentioning
confidence: 99%
“…Thus, as many as n clock cycles may be necessary to complete a single addition in the ASIC implementation of SCAM [9]. Recently, [10] proposed the use of dense 3-D memories along with near-memory processing for a secure CAM search. Although the proposed framework enables high density, the energy and latency overheads of data transfers could be further reduced with CiM.…”
Section: Related Work: Cim and Hementioning
confidence: 99%
“…We compare the energy and performance of CiM-SCAM with an ASIC approach presented in [9], which demonstrates superiority in terms of search time and energy compared to CPU implementations of the same SCAM algorithm, as described in the literature [9], [10]. When comparing to the ASIC [9] implementation of SCAM, we account for data transfers and for the energy and time spent on computations.…”
Section: ) Energy and Performancementioning
confidence: 99%
See 1 more Smart Citation
“…While SHE enables secure and private computing in the cloud, the large size of ciphertexts (hundreds of KB) may result in low speeds due to long computation times as well as the need to constantly transfer data between memory and the CPU. New computing paradigms such as Near-Memory Processing (NMP) and Computing-in-Memory (CiM) are potential solutions for reducing the overhead of data transfers between memory and the CPU [6]- [10]. NMP reduces the energy and latency associated with memory accesses by placing processing units close to the memory.…”
Section: Introductionmentioning
confidence: 99%