Tutorial Day
BeginBeginner Sessions
ADV1Advanced Sessions : High-Performance Server Chip Industry
ADV2Advanced Sessions : Automotive Electronics Chip Industry
ADV3Advanced Sessions : Al Chip industry
ADV4Advanced Sessions : CHERl-Security Extensions
Beginner Sessions7/16 09:00-11:50Room 305
Time | Duration | Title | Speaker |
---|---|---|---|
9:00 | 5' | Opening Remarks | |
9:05 | 30' | From Berkeley to China : A 15-year Odyssey of Democratizing Compute and the Eastern Ecosystem | |
9:35 | 30' | Current Status and Prospects of RISC-V | |
10:05 | 30' | Tea Break | - |
10:35 | 25' | Development of RISC-V Embedded Industry from a Historical Perspective | |
11:00 | 25' | RISC-V and AI Innovative Breakthroughs and Industry Applications | |
11:25 | 25' | Production Journey of the RISC-V High-Performance Server |
Advanced Sessions : High-Performance Server Chip Industry7/16 13:30-17:00Room 305
Time | Duration | Title | Speaker |
---|---|---|---|
13:30 | 90' | High Performance Computing Based RISC-V | |
15:00 | 30' | Tea Break | - |
15:30 | 90' | RISC-V High Performance Server Technology and Product |
Advanced Sessions : Automotive Electronics Chip Industry7/16 13:30-17:00Room 302
Time | Duration | Title | Speaker |
---|---|---|---|
13:30 | 90' | Addressing Safety and Security Holistically for RISC-V Automotive Products in a Specific Application Context | |
15:00 | 30' | Tea Break | - |
15:30 | 45' | RISC-V Open Architecture: Opportunities and Challenges for Automotive Chips | |
16:15 | 45' | Considerations on Standardization for Automotive-Grade RISC-V |
Advanced Sessions : Al Chip industry7/16 13:30-17:00Room 303
Time | Duration | Title | Speaker |
---|---|---|---|
13:30 | 90' | RISC-V AI Chip Technology | |
15:00 | 30' | Tea Break | - |
15:30 | 90' | RISC-V AI Software Ecosystem |
Advanced Sessions : CHERl-Security Extensions7/16 13:30-17:00Room 204
Time | Duration | Title | Speaker |
---|---|---|---|
13:30 | 45' | Introduction to Memory Safety, CHERI and alignment to RISC-V | |
14:15 | 45' | Introduction to Memory Safety - Responsible for 70% of Critical Vulnerabilities & Exploits | |
15:00 | 30' | Tea Break | - |
15:30 | 45' | Introduction to CHERI Technology and Implementations | |
16:15 | 45' | Development & Implementation of Memory Safe Systems |