To see the other types of publications on this topic, follow the link: Hardware isolation.

Journal articles on the topic 'Hardware isolation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hardware isolation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.

Full text
Abstract:
Virtual systems are usually attacked due to the vulnerabilities in the hypervisor. The hypervisor cannot solve this because its code size is too big to implement totally right. This paper proposed a new hardware-software architecture based on hardware isolation, which adds a new component in CPU to provide hard-level isolation. Even when the malicious code gets the highest software privilege, it cannot break into another domain from current domain. This paper also gives the implementation of the booting, memory isolation, scheduling, interrupt handling and inter-domain communication.
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Nianhang, Mengmei Ye, and Sheng Wei. "Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation." IEEE Transactions on Emerging Topics in Computing 7, no. 2 (2019): 253–61. http://dx.doi.org/10.1109/tetc.2017.2648739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hooker, Sara. "The hardware lottery." Communications of the ACM 64, no. 12 (2021): 58–65. http://dx.doi.org/10.1145/3467017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kaplan, David. "Hardware VM Isolation in the Cloud." Queue 21, no. 4 (2023): 49–67. http://dx.doi.org/10.1145/3623392.

Full text
Abstract:
Confidential computing is a security model that fits well with the public cloud. It enables customers to rent VMs while enjoying hardware-based isolation that ensures that a cloud provider cannot purposefully or accidentally see or corrupt their data. SEV-SNP was the first commercially available x86 technology to offer VM isolation for the cloud and is deployed in Microsoft Azure, AWS, and Google Cloud. As confidential computing technologies such as SEV-SNP develop, confidential computing is likely to simply become the default trust model for the cloud.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaplan, David. "Hardware VM Isolation in the Cloud." Communications of the ACM 67, no. 1 (2023): 54–59. http://dx.doi.org/10.1145/3624576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zeng, Qiang Hong, Shi Jian Zhu, Jing Jun Lou, and Shui Qing Xie. "Hardware Design for Active Vibration Isolation Controller." Advanced Materials Research 211-212 (February 2011): 1061–65. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.1061.

Full text
Abstract:
The active vibration control system are described in this paper, and the controller was designed for the active control system, the controller is based on ARM Cortex M3 microcontroller core, ICP series acceleration sensor is use for signal acquisition module, the A / D converter module was designed based on ADS1158 chip, the D/ A converter module was designed based on DAC8564 chip. The controller has the characteristics of high speed and versatility.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Sui, Lu Peng, and Samuel Irving. "Accelerating GPU Hardware Transactional Memory with Snapshot Isolation." ACM SIGARCH Computer Architecture News 45, no. 2 (2017): 282–94. http://dx.doi.org/10.1145/3140659.3080204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Omar, Hamza, and Omer Khan. "PRISM." ACM Transactions on Architecture and Code Optimization 18, no. 3 (2021): 1–25. http://dx.doi.org/10.1145/3450523.

Full text
Abstract:
Multicores increasingly deploy safety-critical parallel applications that demand resiliency against soft-errors to satisfy the safety standards. However, protection against these errors is challenging due to complex communication and data access protocols that aggressively share on-chip hardware resources. Research has explored various temporal and spatial redundancy-based resiliency schemes that provide multicores with high soft-error coverage. However, redundant execution incurs performance overheads due to interference effects induced by aggressive resource sharing. Moreover, these schemes
APA, Harvard, Vancouver, ISO, and other styles
9

Cho, Yeongpil. "Fine-Grained Isolation to Protect Data against In-Process Attacks on AArch64." Electronics 9, no. 2 (2020): 236. http://dx.doi.org/10.3390/electronics9020236.

Full text
Abstract:
In-process attacks are a new class of attacks that circumvent protection schemes centered around inter-process isolation. Against these attacks, researchers have proposed fine-grained data isolation schemes that can protect sensitive data from malicious accesses even during the same process. Their proposals based on salient hardware features, such as ARM® processor architecture’s domain protection, are quite successful, but it cannot be applied to a specific architecture, namely AArch64, as this does not provide the same hardware features. In this paper, therefore, we present Sealer, a fine-gr
APA, Harvard, Vancouver, ISO, and other styles
10

Verghese, Ben, Anoop Gupta, and Mendel Rosenblum. "Performance isolation." ACM SIGOPS Operating Systems Review 32, no. 5 (1998): 181–92. http://dx.doi.org/10.1145/384265.291044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

LI, Xiao-Qing, Xiao-Dong ZHAO, and Qing-Kai ZENG. "One-Way Isolation Execution Model Based on Hardware Virtualization." Journal of Software 23, no. 8 (2012): 2207–22. http://dx.doi.org/10.3724/sp.j.1001.2012.04131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Maene, Pieter, Johannes Gotzfried, Ruan de Clercq, Tilo Muller, Felix Freiling, and Ingrid Verbauwhede. "Hardware-Based Trusted Computing Architectures for Isolation and Attestation." IEEE Transactions on Computers 67, no. 3 (2018): 361–74. http://dx.doi.org/10.1109/tc.2017.2647955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Li Guo, and Jing Gao. "Switch Module Designed to Meet the EPS Reliability Intelligent Control." Applied Mechanics and Materials 623 (August 2014): 195–201. http://dx.doi.org/10.4028/www.scientific.net/amm.623.195.

Full text
Abstract:
This paper considers the design of switch module. It is a key part of intelligent control emergency power supply. The working reliability of the switch module is an important performance index. Firstly, paper according to the characteristics that watchdog microprocessor software vulnerabilities and a control state to maintain after crash recovery, the design software reset and hardware reset propose two solutions. Next, data acquisition and data communications hardware are using photoelectric isolation technology. To achieve true electrical isolation, the system uses three power supply witch a
APA, Harvard, Vancouver, ISO, and other styles
14

Janz, Viktor, Georgi I. Wassilew, Carsten F. Perka, and Michael Müller. "Cerclages after Femoral Osteotomy Are at Risk for Bacterial Colonization during Two-Stage Septic Total Hip Arthroplasty Revision." Journal of Bone and Joint Infection 3, no. 3 (2018): 138–42. http://dx.doi.org/10.7150/jbji.24819.

Full text
Abstract:
Abstract. Aims: In cases of a two-stage septic total hip arthroplasty (THA) exchange a femoral osteotomy with subsequent cerclage stabilization may be necessary to remove a well-fixed stem. This study aims to investigate the rate of bacterial colonization and risk of infection persistence associated with in situ cerclage hardware in two-stage septic THA exchange.Patients and Methods: Twenty-three patients undergoing two-stage THA exchange between 2011 and 2016 were included in this retrospective cohort study. During the re-implantation procedure synovial fluid, periprosthetic tissue samples an
APA, Harvard, Vancouver, ISO, and other styles
15

Zhao, WenHan, Feng Wen, Chen Han, Zhoujian Chu, Qingyue Yao, and Kesong Ji. "Development of GIS Switch State Judgment System Based on Image Recognition." Journal of Physics: Conference Series 2065, no. 1 (2021): 012009. http://dx.doi.org/10.1088/1742-6596/2065/1/012009.

Full text
Abstract:
Abstract Aiming at the fast opening and closing speed of the GIS isolation/grounding switch, manual observation is more difficult, so it is difficult to judge the current switch status. This paper proposes an OpenCV-based image identification algorithm to identify the position of the switch movable contact during the opening and closing process of the isolating switch, thereby judging the state of the isolating switch. This system uses Raspberry Pi as the main hardware core, the server drives the CMOS camera through Raspberry Pi 4B, collects image information in the GIS optical observation win
APA, Harvard, Vancouver, ISO, and other styles
16

Hategekimana, Festus, Taylor JL Whitaker, Md Jubaer Hossain Pantho, and Christophe Bobda. "IoT Device security through dynamic hardware isolation with cloud-Based update." Journal of Systems Architecture 109 (October 2020): 101827. http://dx.doi.org/10.1016/j.sysarc.2020.101827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Wahbe, Robert, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. "Efficient software-based fault isolation." ACM SIGOPS Operating Systems Review 27, no. 5 (1993): 203–16. http://dx.doi.org/10.1145/173668.168635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Goli, Mehran, Muhammad Hassan, Daniel Große, and Rolf Drechsler. "Security validation of VP-based SoCs using dynamic information flow tracking." it - Information Technology 61, no. 1 (2019): 45–58. http://dx.doi.org/10.1515/itit-2018-0027.

Full text
Abstract:
Abstract Modern System-on-Chips (SoCs) are notoriously insecure. Hence, the fundamental security feature of IP isolation is heavily used, e. g., secured Memory Mapped IOs (MMIOs), or secured address ranges in case of memories, are marked as non-accessible. One way to provide strong assurance of security is to define isolation as information flow policy in hardware using the notion of non-interference. Since, an insecure hardware opens up the door for attacks across the entire system stack (from software down to hardware), the security validation process should start as early as possible in the
APA, Harvard, Vancouver, ISO, and other styles
19

Jagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.

Full text
Abstract:
As optical network functions increasingly adopt microservice architectures, traditional con- tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser- vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control func
APA, Harvard, Vancouver, ISO, and other styles
20

Karnopp, D. "Active and Semi-Active Vibration Isolation." Journal of Mechanical Design 117, B (1995): 177–85. http://dx.doi.org/10.1115/1.2836452.

Full text
Abstract:
In the five decades since the founding of the ASME Design Engineering Division, the important problem of vibration isolation has been attacked first through the design of passive spring-damper suspensions and later by the use of active and semi-active elements. This paper reviews the historical development of theoretical concepts necessary for the design of isolation systems and indicates how control theory began to influence vibration isolation in the last half of this period. Practical active and semi-active suspensions have only recently become possible with the advent of powerful but relat
APA, Harvard, Vancouver, ISO, and other styles
21

Karnopp, D. "Active and Semi-Active Vibration Isolation." Journal of Vibration and Acoustics 117, B (1995): 177–85. http://dx.doi.org/10.1115/1.2838660.

Full text
Abstract:
In the five decades since the founding of the ASME Design Engineering Division, the important problem of vibration isolation has been attacked first through the design of passive spring-damper suspensions and later by the use of active and semi-active elements. This paper reviews the historical development of theoretical concepts necessary for the design of isolation systems and indicates how control theory began to influence vibration isolation in the last half of this period. Practical active and semi-active suspensions have only recently become possible with the advent of powerful but relat
APA, Harvard, Vancouver, ISO, and other styles
22

Wu, Bojian, Yujie Zhao, Song Wang, and Zongfeng Li. "The Ground Test System of Double Layer Air Floating Platform and Its Application." Journal of Physics: Conference Series 2562, no. 1 (2023): 012034. http://dx.doi.org/10.1088/1742-6596/2562/1/012034.

Full text
Abstract:
Abstract The suspension test system within the high microgravity scientific experiment cabinet is equipped with double-layer vibration isolation, effectively isolating external disturbances and creating a high microgravity environment within the inner body. Based on this characteristic, this paper proposes a double-layer plane air platform ground test system design. By using a high-precision acceleration sensor and gyroscope of the suspension test platform, the system coordinates the measurement of the double-layer air floating platform. The control mode and algorithm for double-layer vibratio
APA, Harvard, Vancouver, ISO, and other styles
23

Rathore, Muhammad Siraj. "KVM vs. LXC: Comparing Performance and Isolation of Hardware-assisted Virtual Routers." American Journal of Networks and Communications 2, no. 4 (2013): 88. http://dx.doi.org/10.11648/j.ajnc.20130204.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rivera, J. Germán. "Hardware-Based Data Protection/Isolation at Runtime in Ada Code for Microcontrollers." ACM SIGAda Ada Letters 37, no. 2 (2018): 43–50. http://dx.doi.org/10.1145/3232693.3232705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lu, Qi, and M. Satyanaranyanan. "Isolation-only transactions for mobile computing." ACM SIGOPS Operating Systems Review 28, no. 2 (1994): 81–87. http://dx.doi.org/10.1145/198153.198164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ivić, Igor R. "Statistical Evaluation of Time Multiplexing to Mitigate Differential Reflectivity Bias Due to Cross-Polar Coupling." Journal of Atmospheric and Oceanic Technology 33, no. 1 (2016): 127–47. http://dx.doi.org/10.1175/jtech-d-14-00224.1.

Full text
Abstract:
AbstractOne of the main challenges to the use of phased array radar for weather observations is the implementation of dual polarization with acceptable levels of cross-polar fields induced by the antenna. For example, to achieve acceptable differential reflectivity (ZDR) bias (e.g., less than 0.1 dB) using simultaneous transmission and reception of H and V polarized waves, the isolation between coaxial cross-polar and copolar beams needs to be in excess of 50 dB. Because such isolation cannot be achieved at an affordable price by antenna hardware, additional methods are required to attain supp
APA, Harvard, Vancouver, ISO, and other styles
27

Xu, Xian Cheng, and Chuan You Yuan. "A New Method for Security Isolation and Data Transfer." Applied Mechanics and Materials 701-702 (December 2014): 902–6. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.902.

Full text
Abstract:
This paper presents both physical and logical methods that are completely one-way transmission without feedback. The imposed hardware isolation is achieved based on the light transmission property with low cost optic components, while the efficiency and accuracy of data transmission is guaranteed by defining new protocol structure based on UDP. Experiments demonstrate that high performance have been achieved after using our proposed protocol mechanism.
APA, Harvard, Vancouver, ISO, and other styles
28

Jyoti Singh. "Transactional Memory without Hardware Support: A Comprehensive Software-Driven Approach." Panamerican Mathematical Journal 35, no. 1 (2024): 188–98. https://doi.org/10.52783/pmj.v35.i1.5048.

Full text
Abstract:
Transactional memory (TM) simplifies concurrent programming by enabling code blocks to execute in isolation, eliminating the complexities of locks and ensuring data con- sistency. While hardware-based TM (HTM) offers performance advantages, it faces limitations in scalability, flexibility, and hardware dependency. This paper presents a comprehensive anal- ysis of software transactional memory (STM), offering a robust alternative that operates without hardware support. We explore various STM techniques, their implementation challenges, and performance trade-offs compared to HTM. Additionally, w
APA, Harvard, Vancouver, ISO, and other styles
29

Piao, Chang Hao, and Teng Cong. "Study on Isolation Monitoring of High-Voltage Battery System." Applied Mechanics and Materials 44-47 (December 2010): 571–75. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.571.

Full text
Abstract:
After comparing the pros and cons of various isolation monitoring methods, this article presents the isolation monitoring method which based on unbalanced bridge and the characteristics of high-voltage battery system. Battery is an important component for Hybird-electric vehicle. The safety of high-voltage battery system is important specification for Hybird-electric vehicle. This device which uses Freescale’s 16-bit microcontroller with CAN communications capabilities achieve real-time and accurate measurement of isolation resistance of high-voltage battery system. The article focuses on the
APA, Harvard, Vancouver, ISO, and other styles
30

Zverev, M., V. Vostrikova, and D. Teselkin. "Recovering Information from Wireless Sensors in Hardware and Software Platforms." Journal of Physics: Conference Series 2096, no. 1 (2021): 012030. http://dx.doi.org/10.1088/1742-6596/2096/1/012030.

Full text
Abstract:
Abstract The work considers the task of information processing in a subsystem of the hardware-software platform of the simulator complex - a mobile system of simulating isolation breathing apparatuses. The problem of predicting values when data packets are lost during their wireless transmission has been revealed. To solve the problem, an algorithm for data processing based on neural network technology has been developed, which allows reducing the number of data packet losses by predicting the lost values. The experimental studies confirmed the adequacy and effectiveness of the proposed algori
APA, Harvard, Vancouver, ISO, and other styles
31

Hafaifa, Ahmed, Ferhat Laaouad, and Kouider Laroussi. "Fuzzy modeling and control for detection and isolation of surge in industrial centrifugal compressors." Journal of Automatic Control 19, no. 1 (2009): 19–26. http://dx.doi.org/10.2298/jac0901019h.

Full text
Abstract:
This paper provides the possible application of the fuzzy approaches in fault detection and isolation area for a class of complex industrial processes with uncertain interval parameters. The main idea of fuzzy fault detection and isolation is to build a model of a diagnosis procedures, using rules-based Fuzzy Expert System, capable to minimize false alarms enhance detectability and isolability and minimize detection time by hardware implementation to improve reliability, safety and global efficiency. This paper illustrates an alternative implementation to the compression systems supervision ta
APA, Harvard, Vancouver, ISO, and other styles
32

Busi, Matteo, Job Noorman, Jo Van Bulck, et al. "Securing Interruptible Enclaved Execution on Small Microprocessors." ACM Transactions on Programming Languages and Systems 43, no. 3 (2021): 1–77. http://dx.doi.org/10.1145/3470534.

Full text
Abstract:
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken, the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features brings a risk of introducing new software-based side-channel attacks. This article studies the problem of extending a processor with new features without weakening the security of the isolation mechan
APA, Harvard, Vancouver, ISO, and other styles
33

Jain, Shvetank, Fareha Shafique, Vladan Djeric, and Ashvin Goel. "Application-level isolation and recovery with solitude." ACM SIGOPS Operating Systems Review 42, no. 4 (2008): 95–107. http://dx.doi.org/10.1145/1357010.1352603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Park, Woojung, Haeyoung Kim, Janghyun Ji, Jaegeun Moon, and Howon Kim. "Lightweight RISC-V Trusted Execution Environment with Hardware-based Encryption and Memory Isolation." Journal of Digital Contents Society 23, no. 9 (2022): 1813–22. http://dx.doi.org/10.9728/dcs.2022.23.9.1813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hao, Jingjing, and Michel Kinnaert. "Sensor fault detection and isolation over wireless sensor network based on hardware redundancy." Journal of Physics: Conference Series 783 (January 2017): 012006. http://dx.doi.org/10.1088/1742-6596/783/1/012006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Begum, Hajira, and Abdul Rashid. "EchoSense - (Audio Visual Framework for Active Speaker Isolation)." International Research Journal of Computer Science 12, no. 04 (2025): 165–70. https://doi.org/10.26562/irjcs.2025.v1204.09.

Full text
Abstract:
This paper presents EchoSense, a Google Chrome extension designed to enhance speech intelligibility in noisy environments through the fusion of audio and visual cues. It leverages computer vision (face-api.js) for speaker identification using lip movement detection and applies RNNoise, a recurrent neural network-based model, for real-time noise suppression. The system integrates the Web Audio API and WebRTC for in-browser audio-video processing, enabling speaker-focused filtering without the need for external hardware or cloud services. Preliminary evaluations show that EchoSense effectively s
APA, Harvard, Vancouver, ISO, and other styles
37

Roshanravan, Sajad, and Saeed Shamaghdari. "Simultaneous fault detection and isolation and fault-tolerant control using supervisory control technique: asynchronous switching approach." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering 234, no. 8 (2019): 900–911. http://dx.doi.org/10.1177/0959651819893891.

Full text
Abstract:
This article focuses on the design of a novel active fault-tolerant control scheme based on supervisory control technique for a class of nonlinear systems. This framework relies on a supervisory switching among a finite family of predesigned candidate controllers, which simultaneously performs isolation and accommodation of intermittent faults. This method does not require any additional model or filter bank for fault isolation. Two controller switching algorithms are introduced based on the dwell time and state which are designed especially for this purpose. There is often some time delay bet
APA, Harvard, Vancouver, ISO, and other styles
38

Choi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.

Full text
Abstract:
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations. Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. This paper revisits the history of improvements to SMC o
APA, Harvard, Vancouver, ISO, and other styles
39

Rybakov, S. A., and N. Yu Polyakov. "Input/output virtualization of Elbrus microprocessors." Radio industry (Russia) 30, no. 3 (2020): 34–39. http://dx.doi.org/10.21778/2413-9599-2020-30-3-34-39.

Full text
Abstract:
The article describes and compares the methods of input-output (I/O) virtualization, adapted for the Elbrus architecture. The presented methods of software emulation and paravirtualization of devices do not require hardware support and provide complete isolation of real devices from virtual ones at the hypervisor level, which allows for better consolidation of physical I/O. Direct assignment of the device to the guest provides better performance over the other methods, but requires hardware modifications in the I/O Memory Management Unit (IOMMU). Hardware support for I/O virtualization was imp
APA, Harvard, Vancouver, ISO, and other styles
40

Majumder, Shibarchi, Jens Frederik Dalsgaard Nielsen, Thomas Bak, and Anders la Cour-Harbo. "Reliable flight control system architecture for agile airborne platforms: an asymmetric multiprocessing approach." Aeronautical Journal 123, no. 1264 (2019): 840–62. http://dx.doi.org/10.1017/aer.2019.30.

Full text
Abstract:
AbstractSystem software subsystems in an unmanned aircraft system share hardware resources due to space, weight, and power constraints. Such subsystems have different criticality, requirements, and failure rates, and can cause undesired interference when sharing the same hardware. A component with high failure rate can reduce the reliability of the system unless a fault containment mechanism is adopted.This work proposes an asymmetric multiprocessor architecture to establish isolation at the hardware level for distributed implementation of safety-critical subsystems along with user defined pay
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Cong, Zhong Hong, and Jian-Min Jiang. "Scheduling in Real-Time Mobile Systems." ACM Transactions on Embedded Computing Systems 21, no. 3 (2022): 1–36. http://dx.doi.org/10.1145/3517747.

Full text
Abstract:
To guarantee the safety and security of a real-time mobile system such as an intelligent transportation system, it is necessary to model and analyze its behaviors prior to actual development. In particular, the mobile objects in such systems must be isolated from each other so that they do not collide with each other. Since isolation means two or more mobile objects must not be located in the same place at the same time, a scheduling policy is required to control and coordinate the movement of such objects. However, traditional scheduling theories are based on task scheduling which is coarse-g
APA, Harvard, Vancouver, ISO, and other styles
42

Majumder, S., J. F. D. Nielsen, A. La Cour-Harbo, H. Schiøler, and T. Bak. "A real-time on-chip network architecture for mixed criticality aerospace systems." Aeronautical Journal 123, no. 1269 (2019): 1788–806. http://dx.doi.org/10.1017/aer.2019.80.

Full text
Abstract:
ABSTRACTIntegrated Modular Avionics enables applications of different criticality levels to share the same hardware platform with an established temporal and spatial isolation. On-chip communication systems for such platforms must support different bandwidth and latency requirements of applications while preserving time predictability. In this paper, our concern is a time-predictable on-chip network architecture for targeting applications in mixed-criticality aerospace systems. The proposed architecture introduces a mixed, priority-based and time-division-multiplexed arbitration scheme to acco
APA, Harvard, Vancouver, ISO, and other styles
43

Whitaker, Andrew, Marianne Shaw, and Steven D. Gribble. "Scale and performance in the Denali isolation kernel." ACM SIGOPS Operating Systems Review 36, SI (2002): 195–209. http://dx.doi.org/10.1145/844128.844147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Russinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy." Queue 21, no. 4 (2023): 44–48. http://dx.doi.org/10.1145/3623461.

Full text
Abstract:
Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation. This means services can be designed that segment data based on least-privilege access principles, while all other code in the system sees only encrypted data. Crucially, the isolation is rooted in novel hardware primitives, effe
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Jiyuan, Yuxin Qiu, Ben Limpanukorn, Hong Jin Kang, Qian Zhang, and Miryung Kim. "DuoReduce: Bug Isolation for Multi-layer Extensible Compilation." Proceedings of the ACM on Software Engineering 2, FSE (2025): 647–67. https://doi.org/10.1145/3715747.

Full text
Abstract:
In recent years, the MLIR framework has had explosive growth due to the need for extensible deep learning compilers for hardware accelerators. Such examples include Triton, CIRCT, and ONNX-MLIR. MLIR compilers introduce significant complexities in localizing bugs or inefficiencies because of their layered optimization and transformation process with compilation passes. While existing delta debugging techniques can be used to identify a minimum subset of IR code that reproduces a given bug symptom, their naive application to MLIR is time-consuming because real-world MLIR compilers usually invol
APA, Harvard, Vancouver, ISO, and other styles
46

Shankar, Sanjeev. "Best Practices for Debugging Embedded Software." European Journal of Computer Science and Information Technology 13, no. 42 (2025): 133–46. https://doi.org/10.37745/ejcsit.2013/vol13n42133146.

Full text
Abstract:
This article explores effective debugging strategies for embedded systems that operate under hardware constraints, real-time requirements, and limited visibility. It begins by emphasizing the importance of understanding system fundamentals, including microcontroller architecture, memory layouts, interrupt structures, and communication protocols. The work presents systematic debugging approaches centered on problem reproduction, component isolation, and regression testing, alongside an examination of hardware-based debugging tools such as JTAG/SWD interfaces, in-circuit emulators, oscilloscopes
APA, Harvard, Vancouver, ISO, and other styles
47

Valente, Giacomo, Paolo Giammatteo, Vittoriano Muttillo, Luigi Pomante, and Tania Di Mascio. "A Lightweight, Hardware-Based Support for Isolation in Mixed-Criticality Network-on-Chip Architectures." Advances in Science, Technology and Engineering Systems Journal 4, no. 4 (2019): 561–73. http://dx.doi.org/10.25046/aj040467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Tan, Juncheng Li, Pei Li, and Jianyu Liu. "In-band full-duplex technology in VDES: a hardware implementation for high isolation in the analogue domain." Journal of Physics: Conference Series 2991, no. 1 (2025): 012025. https://doi.org/10.1088/1742-6596/2991/1/012025.

Full text
Abstract:
Abstract In-band full-duplex technology can transmit and receive information in the same frequency band at the same time, which can greatly improve the throughput and spectrum utilization of the communication system. In this paper, the in-band full-duplex technology is applied to the VHF Data Exchange System (VDES) to eliminate the self-interference signal and improve the isolation between transceiver links in the 160 MHz frequency band. The time-domain reconstruction method is used to design the scheme for two narrow frequency bands of VDES. An RF cancellation board is designed to reconstruct
APA, Harvard, Vancouver, ISO, and other styles
49

Singh, Ranu, and Dr Monika Kapoor. "Self-Healing Hardware Systems: Integrating Fault Tolerance for Enhanced Reliability and Performance." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02848.

Full text
Abstract:
Self-healing hardware systems are designed to autonomously detect, diagnose, and recover from faults, ensuring uninterrupted operation and improved system reliability. Fault tolerance plays a crucial role in these systems by implementing strategies that mitigate failures and maintain performance in critical applications such as aerospace, medical devices, and autonomous systems. As hardware complexity increases, effective fault-tolerant mechanisms become essential to enhance resilience and longevity. This paper explores fundamental fault tolerance techniques in self-healing systems, including
APA, Harvard, Vancouver, ISO, and other styles
50

Bustamante, Ricardo, Gilberto Mosqueda, and Minkyu Kim. "Enhanced Seismic Protection System for an Emergency Diesel Generator Unit." Energies 15, no. 5 (2022): 1728. http://dx.doi.org/10.3390/en15051728.

Full text
Abstract:
Nuclear power plants are required to maintain operation after an earthquake, leading to a safe shutdown if necessary. In the case of a loss of offsite power, the onsite emergency diesel generator is critical to ensure procedural operations of the nuclear power plant. As a means to reduce the overall seismic risk, a three-dimensional seismic protection system is proposed to enhance the seismic performance of the emergency diesel generator. The proposed seismic isolation system decouples the horizontal and vertical components of shaking and considers available hardware to achieve an effective is
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!