scispace - formally typeset
K

Ken Mai

Researcher at Carnegie Mellon University

Publications -  79
Citations -  6276

Ken Mai is an academic researcher from Carnegie Mellon University. The author has contributed to research in topics: Flash memory & CMOS. The author has an hindex of 30, co-authored 76 publications receiving 5858 citations. Previous affiliations of Ken Mai include Stanford University.

Papers
More filters
Proceedings ArticleDOI

A Top-Down Design Methodology for Synthesizing FPGA Fabrics Using Standard ASIC Flow

TL;DR: Post layout timing analysis of placed and routed FPGA fabrics on a 28nm industrial CMOS process demonstrates that the top-down methodology can place and route fabrics without the need for any manual buffering or floorplanning while providing ~20% average improvement in performance across multiple benchmark designs.
Proceedings ArticleDOI

A Technology-Agnostic Simulation Environment (TASE) for iterative custom IC design across processes

TL;DR: A Technology Agnostic Simulation Environment (TASE) is presented, which is a tool that uses simulation templates to capture the designer's knowledge and separate it from the technology-specific components of a simulation.
Proceedings ArticleDOI

A compact energy-efficient pseudo-static camouflaged logic family

TL;DR: A Pseudo-Static Camouflaged (PS-CAMO) logic family is proposed to improve the energy overheads of camouflaged logic gates while maintaining the reliability and yields of static CMOS logic gates.

REDAC: Distributed, Asynchronous Redundancy in Shared Memory Servers

TL;DR: This work proposes REDAC, a set of lightweight mechanisms for distributed, asynchronous redundancy within a sharedmemory multiprocessor that provides scalable buffering for unchecked state updates, permitting the distribution of redundant execution across multiple nodes of a scalable shared-memory server.
Proceedings ArticleDOI

A 32kB secure cache memory with dynamic replacement mapping in 65nm bulk CMOS

TL;DR: A secure cache design is presented that defeats software side-channel attacks targeted at hardware caches and is dynamic and randomized by replacing the address decoder of a conventional cache with a CAM.