F
Franck Wajsburt
Researcher at University of Paris
Publications - 19
Citations - 103
Franck Wajsburt is an academic researcher from University of Paris. The author has contributed to research in topics: Hypervisor & Scalability. The author has an hindex of 6, co-authored 19 publications receiving 100 citations. Previous affiliations of Franck Wajsburt include Pierre-and-Marie-Curie University.
Papers
More filters
Proceedings ArticleDOI
An out-of-order superscalar processor on FPGA: the ReOrder buffer design
TL;DR: This work proposes a FPGA friendly ROB (ReOrder Buffer) architecture using only 2 ports RAM called a multi-bank ROB architecture that is suitable for FPGAs.
Proceedings Article
Programmable routers for efficient mapping of applications onto NoC-based MPSoCs
Manel Djemal,François Pêcheux,Dumitru Potop-Butucaru,R. de Simone,Franck Wajsburt,Zhen Zhang +5 more
TL;DR: This work extends the state-of-the-art DSPIN network-on-chip architecture by defining programmable NoC routers that can establish effective static scheduling and routing of data packets as demanded by the application.
Proceedings ArticleDOI
Protocol and performance analysis of the MPC parallel computer
O. Gluck,A. Zerrouki,Jean-Lou Desbarbieux,A. Fenyo,A. Grener,Franck Wajsburt,Cyril Spasevski,Fabricio Alves Barbosa da Silva,E. Dreyfus +8 more
TL;DR: Several possible optimizations to reduce the overall MPI transfer latency on the MPC Computer are revealed.
Proceedings Article
Does Shared-Memory, Highly Multi-Threaded, Single-Application Scale on Many-Cores?
Ghassan Almaless,Franck Wajsburt +1 more
TL;DR: This paper proposes to verify experimentally the scalability of shared-memory, PThreads based, applications, on Cycle-Accurate-Bit-Acc accurate (CABA) simulated, 512-cores, and shows a scalability limitation beyond 64 cores for FFT and 256 cores for EPFilter.
Management of the security in smart secure devices
Bruno Robisson,Michel Agoyan,Sylvain Bouquet,Minh Huu Nguyen,Sébastien Le Henaff,Patrick Soquet,Guillaume Phan,Franck Wajsburt,Pirouz Bazargan-Sabet,Nathalie Drach +9 more
TL;DR: Vulnerability of electronic material that implements cryptography, for services of confidentiality, authentication and data integrity, is perhaps the most important, and some unfaithful means on this material make it possible to extract confidential information like encoding keys and thus to lower the security of all the protected transmission chain of information.