Skip to main content

Showing 1–3 of 3 results for author: Van Hensbergen, E

.
  1. arXiv:2506.02233  [pdf, ps, other

    cs.PL

    Improving compiler support for SIMD offload using Arm Streaming SVE

    Authors: Mohamed Husain Noor Mohamed, Adarsh Patil, Latchesar Ionkov, Eric Van Hensbergen

    Abstract: The wider adoption of tightly coupled core-adjacent accelerators, such as Arm Scalable Matrix Extension (SME), hinges on lowering software programming complexity. In this paper, we focus on enabling the use of SME architecture in Streaming Scalable Vector Extension (SSVE) mode for workloads written in C/C++. While current compilers optimize loops for all types of SIMD instructions, these technique… ▽ More

    Submitted 2 June, 2025; originally announced June 2025.

  2. arXiv:2404.02868  [pdf, other

    cs.ET

    UDON: A case for offloading to general purpose compute on CXL memory

    Authors: Jon Hermes, Josh Minor, Minjun Wu, Adarsh Patil, Eric Van Hensbergen

    Abstract: Upcoming CXL-based disaggregated memory devices feature special purpose units to offload compute to near-memory. In this paper, we explore opportunities for offloading compute to general purpose cores on CXL memory devices, thereby enabling a greater utility and diversity of offload. We study two classes of popular memory intensive applications: ML inference and vector database as candidates for… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Presented at the 3rd Workshop on Heterogeneous Composable and Disaggregated Systems (HCDS 2024)

  3. arXiv:2205.03322  [pdf, ps, other

    cs.CR cs.OS cs.PL

    Private delegated computations using strong isolation

    Authors: Mathias Brossard, Guilhem Bryant, Basma El Gaabouri, Xinxin Fan, Alexandre Ferreira, Edmund Grimley-Evans, Christopher Haster, Evan Johnson, Derek Miller, Fan Mo, Dominic P. Mulligan, Nick Spinale, Eric van Hensbergen, Hugo J. M. Vincent, Shale Xiong

    Abstract: Sensitive computations are now routinely delegated to third-parties. In response, Confidential Computing technologies are being introduced to microprocessors, offering a protected processing environment, which we generically call an isolate, providing confidentiality and integrity guarantees to code and data hosted within -- even in the face of a privileged attacker. Isolates, with an attestation… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.