Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Robert Rinker is active.

Publication


Featured researches published by Robert Rinker.


The Journal of Supercomputing | 2002

Mapping a Single Assignment Programming Language to Reconfigurable Systems

A. P. Wim Böhm; Jeffrey Hammes; Bruce A. Draper; Monica Chawathe; Charlie Ross; Robert Rinker; Walid A. Najjar

This paper presents the high level, machine independent, algorithmic, single-assignment programming language SA-C and its optimizing compiler targeting reconfigurable systems. SA-C is intended for Image Processing applications. Language features are introduced and discussed. The intermediate forms DDCF, DFG and AHA, used in the optimization and code-generation phases, are described. Conventional and reconfigurable system specific optimizations are introduced. The code generation process is described. The performance for these systems is analyzed, using a range of applications from simple Image Processing Library functions to more comprehensive applications, such as the ARAGTAP target acquisition prescreener.


field-programmable custom computing machines | 2002

Fast area estimation to support compiler optimizations in FPGA-based reconfigurable systems

Dhananjay Kulkarni; Walid A. Najjar; Robert Rinker; Fadi J. Kurdahi

Several projects have developed compiler tools that translate high-level languages down to hardware description languages for mapping onto FPGA-based reconfigurable computers. These compiler tools can apply extensive transformations that exploit the parallelism inherent in the computations. However, the transformations can have a major impact on the chip area (number of logic blocks) used on the FPGA. It is imperative therefore that the compiler user be provided with feedback indicating how much space is being used. In this paper we present a fast compile-time area estimation technique to guide the compiler optimizations. Experimental results show that our technique achieves an accuracy within 2.5% for small image-processing operators, and within 5.0% for larger benchmarks, as compared to the usual post-compilation synthesis tool estimations. The estimation time is in the order of milliseconds as compared to several minutes for a synthesis tool.


ACM Transactions on Design Automation of Electronic Systems | 2006

Compile-time area estimation for LUT-based FPGAs

Dhananjay Kulkarni; Walid A. Najjar; Robert Rinker; Fadi J. Kurdahi

The Cameron Project has developed a system for compiling codes written in a high-level language called SA-C, to FPGA-based reconfigurable computing systems. In order to exploit the parallelism available on the FPGAs, the SA-C compiler performs a large number of optimizations such as full loop unrolling, loop fusion and strip-mining. However, since the area on an FPGA is limited, the compiler needs to know the effect of compiler optimizations on the FPGA area; this information is typically not available until after the synthesis and place and route stage, which can take hours. In this article, we present a compile-time area estimation technique to guide SA-C compiler optimizations. We demonstrate our technique for a variety of benchmarks written in SA-C. Experimental results show that our technique predicts the area required for a design to within 2.5% of actual for small image processing operators and to within 5.0% for larger benchmarks. The estimation time is in the order of milliseconds, compared with minutes for the synthesis tool.


IEEE Transactions on Very Large Scale Integration Systems | 2001

An automated process for compiling dataflow graphs into reconfigurable hardware

Robert Rinker; Margaret Carter; Amitkumar Patel; Monica Chawathe; Charlie Ross; Jeffrey Hammes; Walid A. Najjar; Wim Bohm

We describe a system, developed as part of the Cameron project, which compiles programs written in a single-assignment subset of C called SA-C into dataflow graphs and then into VHDL. The primary application domain is image processing. The system consists of an optimizing compiler which produces dataflow graphs and a dataflow graph to VHDL translator. The method used for the translation is described here, along with some results on an application. The objective is not to produce yet another design entry tool, but rather to shift the programming paradigm from HDLs to an algorithmic level, thereby extending the realm of hardware design to the application programmer.


application-specific systems, architectures, and processors | 2000

Compiling image processing applications to reconfigurable hardware

Robert Rinker; Jeffrey Hammes; Walid A. Najjar; A. P. Wim Böhm; Bruce A. Draper

This paper describes the compilation of high-level language programs written in a single-assignment language called SA-C into the binary codes used for programming reconfigurable hardware. The primary application domain is image processing. The paper describes the SA-C language, the compiler and the optimizations it performs, the process of converting the intermediate form called dataflow graphs into VHDL, and the generation of hardware configuration codes. Performance data on a typical image processing program, written in SA-C and executed on a reconfigurable computing system, is presented and compared to a hand-written VHDL version and a C version running on conventional processors.


bioinformatics and biomedicine | 2016

Visual orchestration and autonomous execution of distributed and heterogeneous computational biology pipelines

Xin Mou; Hasan M. Jamil; Robert Rinker

Data integration continues to baffle researchers even though substantial progress has been made. Although the emergence of technologies such as XML, web services, semantic web and cloud computing have helped, a system in which biologists are comfortable articulating new applications and developing them without technical assistance from a computing expert is yet to be realized. The distance between a friendly graphical interface that does little, and a “traditional” system though clunky yet powerful, is deemed too great more often than not. The question that remains unanswered is, if a user can state her query involving a set of complex, heterogeneous and distributed life sciences resources in an easy to use language and execute it without further help from a computer savvy programmer. In this paper, we present a declarative meta-language, called VisFlow, for requirement specification, and a translator for mapping requirements into executable queries in a variant of SQL augmented with integration artifacts.


cyber security and information intelligence research workshop | 2009

Resilient multi-core systems: a hierarchical formal model for N-variant executions

Axel W. Krings; Li Tan; Clinton Jeffery; Robert Rinker

This research presents a hierarchical formal model capable of providing adjustable levels of service and quality of assurance, which is especially suitable for multi-core processor systems. The multi-layered architecture supports multiple levels of fault detection, masking, and dynamic load balancing. Unlike traditional fault-tolerant architectures that treat service requirements uniformly, each layer of the assured architecture implements a different level of services and information assurances. The system achieves load balancing by moving between layers of different complexity. Functionalities at different layers range from essential services necessary to satisfy the most stringent requirements for information assurance and system survivability at the lowest layer, to increasingly sophisticated functionalities with extended capabilities and complexity at higher layers. Low-layer functionalities can be used to monitor the behavior of high-layer functionalities. At each layer of the assured architecture, N-variant implementations make efficient use of multi-core hardware. The degree of the introduced redundancy in each layer determines the mix of faults that can be tolerated. The use of hybrid fault models allows us to consider fault types ranging from benign faults to Byzantine faults. Our framework extends recent work in N-variant systems for intrusion detection, which are demonstrated to be special cases. Furthermore, it allows the movement in a tradeoff space between (1) the levels of assurance provided at different layers, (2) the levels of redundancy used at specific layers, which determine the fault types that can be tolerated, and (3) the desired run-time overhead.


Proceedings of the 10th Annual Cyber and Information Security Research Conference on | 2015

On the Design of Jamming-Aware Safety Applications in VANETs

Hani Alturkostani; Anup Chitrakar; Robert Rinker; Axel W. Krings

Connected vehicles communicate either with each other or with the fixed infrastructure using Dedicated Short Range Communication (DSRC). The communication is used by DSRC safety applications, such as forward collision warning, which are intended to reduce accidents. Since these safety applications operate in a critical infrastructure, reliability of the applications is essential. This research considers jamming as the source of a malicious act that could significantly affect reliability. Previous research has discussed jamming detection and prevention in the context of wireless networks in general, but little focus has been on Vehicular Ad Hoc Networks (VANET), which have unique characteristics. Other research discussed jamming detection in VANET, however it is not aligned with current DSRC standards. We propose a new jamming-aware algorithm for DSRC safety application design for VANET that increases reliability using jamming detection and consequent fail-safe behavior, without any alteration of existing protocols and standards. The impact of deceptive jamming on data rates and the impact of the jammers data rate were studied using actual field measurements. Finally, we show the operation of the jamming-aware algorithm using field data.


hawaii international conference on system sciences | 2012

Improving Security Assurance of Embedded Systems through Systemic Dissolution of Architected Resources

Michael D. Wilder; Robert Rinker

Resource constraints imposed upon embedded systems make it particularly challenging to provide high levels of security assurance without degrading their performance. We present a method for increasing security assurance of embedded systems without reducing system performance. This method employs a systemic dissolution of architected resources that reduces the attack surface of embedded systems. We show that attacks which insert foreign instructions or modify existing instructions are impossible against systems hardened using this method. We further show that systems hardened using this method are difficult if not impossible to compromise using attacks that re-use existing program logic by diverting control flow, such as return-into-libc. We discuss advantages and shortcomings of this method, and describe a prototype that applies the method to programs targeted for the Intel 8051.


digital systems design | 2011

Synthesizing Concurrent Synchronous Computing Machines from Interrupt-Driven Binaries

Michael D. Wilder; Robert Rinker

Soft processors are increasingly being used to host embedded systems applications on reconfigurable computing platforms such as the field-programmable gate array (FPGA). Soft processors are sequential, synchronous devices that are not capable of exploiting the concurrency available on FPGAs. We present a method for automatically synthesizing interrupt-driven binaries into custom, self-contained, circuitizable finite-state machine with data path (FSMD) descriptions that are capable of leveraging the concurrency of the FPGA. We show how this method increases the computational density of interrupt-driven applications while decreasing interrupt servicing latencies, mitigating live lock, and eliminating overhead associated with interrupt context switching. We discuss implications and limitations of this method, and describe a prototype which implements the method for programs targeted for the Intel 8051.

Collaboration


Dive into the Robert Rinker's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeffrey Hammes

Colorado State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A. P. Wim Böhm

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Bruce A. Draper

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Charlie Ross

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Monica Chawathe

Colorado State University

View shared research outputs
Top Co-Authors

Avatar

Amitkumar Patel

Colorado State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge