Rainer Buchty

Learn More
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared network infrastructure. While these algorithms can be run with moderate performance on general purpose processors, such processors do not meet typical embedded systems requirements(More)
When targeting hardware accelerators and reconfigurable processing units, the question of programmability arises, i.e., how different implementations of individual, configuration-specific functions are provided. Conventionally, this is resolved either at compilation time when a specific hardware environment is targeted, by initialization routines at program(More)
Nowadays, many possible configurations of heterogeneous systems exist, posing several new challenges to application development: different types of processing units usually require individual programming models with dedicated runtime systems and accompanying libraries. If these are absent on an end-user system, e.g. because the respective hardware is not(More)
Today's approaches towards heterogeneous computing rely on either the programmer or dedicated programming models to efficiently integrate heterogeneous components. In this work, we propose an adaptive cost-aware function-migration mechanism built on top of a light-weight hardware abstraction layer. With this mechanism, the highly dynamic task of choosing(More)
The 2D DWT consists of two 1D DWT in both directions: horizontal filtering processes the rows followed by vertical filtering processes the columns. It is well known that a straightforward implementation of the vertical filtering shows quite different performance with various working set sizes. The only reasonable explanation for this has to be the access(More)
The Digital on-demand Computing Organism (DodOrg) is a novel system concept based on biological concepts. Major part of DodOrg is a sophisticated monitoring infrastructure spanning all system layers from hardware to application, providing necessary information for system surveillance and the adaptive processes triggered by an organic middleware and the(More)
Recent examinations of program behavior at run-time revealed distinct phases. Thus, it is evident that af ramework for supporting hardware adaptation to phase behavior is needed. With the memory access behavior being most important and cache accesses being av ery big subset of them, we herein propose an infrastructure for fitting cache accesses to(More)
With the advent of reconfigurable platforms and GPUs, we need means to successfully support the programmer and the system scheduler in efficiently exploiting the resources of the system. We present an approach of how the programmer can annotate the code so that a hardware abstraction layer can choose which resource to use for a given function call in a(More)