Evaluation of Open-Source Linear Algebra Libraries in Embedded Applications

被引:0
|
作者
Fibich, Christian [1 ]
Tauner, Stefan [1 ]
Roessler, Peter [1 ]
Horauer, Martin [1 ]
Krapfenbauer, Markus [2 ]
Linauer, Martin [2 ]
Matschnig, Martin [3 ]
Taucher, Herbert [3 ]
机构
[1] Univ Appl Sci Technikum Wien, Dept Elect Engn, Hochstadtpl 6, A-1200 Vienna, Austria
[2] Kapsch TrafficCom AG, Europl 2, A-1120 Vienna, Austria
[3] Siemens AG Austria, Res Grp Elect Design, Corp Technol, Siemensstr 90, A-1210 Vienna, Austria
关键词
Embedded Systems; Basic Linear Algebra Subprograms; BLAS; Benchmarks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many emerging applications based on technologies like machine learning or cryptography mandate increased numerical computations being carried out close to the sensors in respective embedded processing units. Rather than reinventing the wheel, adoption of existing mathematical software libraries from standard desktop computing seems viable. To that end, this paper evaluates existing implementations of the Basic Linear Algebra Subprograms (BLAS) interface for their use on embedded computing devices. In particular, various implementations are benchmarked with regard to their performance and memory consumption on a comparatively small RISC CPU. To facilitate classfication on a broader range we use a diverse selection of test applications from small synthetic benchmarks like simple vector and matrix operations to real-world applications using Artificial Neural Networks (ANNs).
引用
收藏
页码:228 / 233
页数:6
相关论文
共 50 条
  • [1] An Introduction to Open-Source Linear Algebra Tools and Parallelisation for Power System Applications
    De Rybel, Tom
    Tomim, Marcelo
    Singh, Arvind
    Marti, Jose R.
    [J]. 2008 IEEE ELECTRICAL POWER AND ENERGY CONFERENCE, 2008, : 476 - 483
  • [2] Security Evaluation Criteria of Open-Source Libraries
    Mills, Vivian
    Butakov, Sergey
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART V, 2022, 13381 : 422 - 435
  • [3] On the Evaluation of SEEs on Open-Source Embedded Static RAMs
    Azimi, S.
    De Sio, C.
    Sterpone, L.
    [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 114 - 119
  • [4] Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
    Ye, Xiaodong
    Tan, Teik Guan
    Zhou, Jianying
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 283 - 302
  • [5] Longitudinal Evaluation of Software Quality Metrics in Open-Source Applications
    Molnar, Arthur-Jozsef
    Neamtu, Alexandra
    Motogna, Simona
    [J]. PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE), 2019, : 80 - 91
  • [6] An open-source based DSP with enhanced multimedia processing capacity for embedded applications
    Mai, Songping
    Yang, Kun
    Lan, Wenli
    Zhang, Chun
    Wang, Zhihua
    [J]. 2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 939 - 942
  • [7] Open-Source MQTT Evaluation
    Bender, Melvin
    Kirdan, Erkin
    Pahl, Marc-Oliver
    Carle, Georg
    [J]. 2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,
  • [8] Impact Assessment for Vulnerabilities in Open-Source Software Libraries
    Plate, Henrik
    Ponta, Serena Elisa
    Sabetta, Antonino
    [J]. 2015 31ST INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME) PROCEEDINGS, 2015, : 411 - 420
  • [9] A Dataset of Open-Source Android Applications
    Krutz, Daniel E.
    Mirakhorli, Mehdi
    Malachowsky, Samuel A.
    Ruiz, Andres
    Peterson, Jacob
    Filipski, Andrew
    Smith, Jared
    [J]. 12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), 2015, : 522 - 525
  • [10] Open-Source Applications of TCPA Hardware
    Faez, Karim
    Karimabad, Ashkan Hassani
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 161 - 168