Energy-efficient computing-in-memory architecture for AI processor:device,circuit,architecture persp

来源 :中国科学:信息科学(英文版) | 被引量 : 0次 | 上传用户:chengbj0310
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
An artificial intelligence (AI) processor is a promising solution for energy-efficient data process-ing,including health monitoring and image/voice recognition.However,data movements between compute part and memory induce memory wall and power wall challenges to the conventional computing architecture.Recently,the memory-centric architecture has been revised to solve the data movement issue,where the memory is equipped with the compute-capable memory technique,namely,computing-in-memory (CIM).In this paper,we analyze the requirement of AI algorithms on the data movement and low power requirement of AI processors.In addition,we introduce the story of CIM and implementation methodologies of CIM architecture.Furthermore,we present several novel solutions beyond traditional analog-digital mixed static random-access memory (SRAM)-based CIM architecture.Finally,recent CIM tape-out studies are listed and discussed.
其他文献
Individual privacy preservation has become an important issue with the development of big data technology.The definition of p-differential identifiability (DI) precisely matches the legal definitions of privacy,which can provide an easy parameterization a
Tangential leakage loss reduction has great significance on improving the performance of scroll compressors.In this study,the flow field of a scroll compressor working with CO2 was numerically investigated.The development characteristics of the tangential
In order to protect the privacy and data security of mobile devices during the transactions in the industrial Internet of Things (IIoT),we propose a mobile edge computing (MEC)-based mobile blockchain framework by considering the limited bandwidth and com
Dear editor,rnImplementation attacks such as fault attack(FA)[1]and side-channel analysis (SCA)[2]are signifi-cant threats to the cryptographic device security.Infective countermeasure is a promising strategy to resist FAs.Its principle is to scramble the
期刊
In this study,the fault-tolerant attitude control of flexible spacecraft is investigated over digital communication channels,where a uniform quantizer is considered with respect to the sensor signals and controller indexes.Further,an adaptive fuzzy backst
Dear editor,rnHuman-powered lower exoskeletons are widely studied by academia and industry with regard to human locomotion and strength augmentation.Technological developments have boosted the use of machine learning toward improv-ing the control performa
期刊
In consideration of the high-density dislocations from the lithiation process of high-capacity electrodes in Li-ion batteries,in this paper,a new elastoplastic model is established to describe the diffusion-induced deformation and damage fracture.With the
This paper surveys domain-specific architectures(DSAs) built from two emerging memory technologies. Hybrid memory cube(HMC) and high bandwidth memory(HBM) can reduce data movement between memory and c
A random fault or a malicious attack can compromise the security of decryption systems.Using a stable and monotonous feedback shift register (FSR) as the main building block in a convolutional decoder can limit some error propagation.This work focuses on
A multi-fingered robotic hand with curved fingertips enables contact re-positioning without reat-taching at the expense of fingertip rolling.This rolling stands for a characteristic that facilitates dexterous manipulation but results in an algebraically c