Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Hardware isolation.

Artykuły w czasopismach na temat „Hardware isolation”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Hardware isolation”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Shang, Ming. "A New Hardware Isolation Architecture." Applied Mechanics and Materials 530-531 (February 2014): 631–36. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.631.

Pełny tekst źródła
Streszczenie:
Virtual systems are usually attacked due to the vulnerabilities in the hypervisor. The hypervisor cannot solve this because its code size is too big to implement totally right. This paper proposed a new hardware-software architecture based on hardware isolation, which adds a new component in CPU to provide hard-level isolation. Even when the malicious code gets the highest software privilege, it cannot break into another domain from current domain. This paper also gives the implementation of the booting, memory isolation, scheduling, interrupt handling and inter-domain communication.
Style APA, Harvard, Vancouver, ISO itp.
2

Hu, Nianhang, Mengmei Ye, and Sheng Wei. "Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation." IEEE Transactions on Emerging Topics in Computing 7, no. 2 (2019): 253–61. http://dx.doi.org/10.1109/tetc.2017.2648739.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hooker, Sara. "The hardware lottery." Communications of the ACM 64, no. 12 (2021): 58–65. http://dx.doi.org/10.1145/3467017.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kaplan, David. "Hardware VM Isolation in the Cloud." Queue 21, no. 4 (2023): 49–67. http://dx.doi.org/10.1145/3623392.

Pełny tekst źródła
Streszczenie:
Confidential computing is a security model that fits well with the public cloud. It enables customers to rent VMs while enjoying hardware-based isolation that ensures that a cloud provider cannot purposefully or accidentally see or corrupt their data. SEV-SNP was the first commercially available x86 technology to offer VM isolation for the cloud and is deployed in Microsoft Azure, AWS, and Google Cloud. As confidential computing technologies such as SEV-SNP develop, confidential computing is likely to simply become the default trust model for the cloud.
Style APA, Harvard, Vancouver, ISO itp.
5

Kaplan, David. "Hardware VM Isolation in the Cloud." Communications of the ACM 67, no. 1 (2023): 54–59. http://dx.doi.org/10.1145/3624576.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zeng, Qiang Hong, Shi Jian Zhu, Jing Jun Lou, and Shui Qing Xie. "Hardware Design for Active Vibration Isolation Controller." Advanced Materials Research 211-212 (February 2011): 1061–65. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.1061.

Pełny tekst źródła
Streszczenie:
The active vibration control system are described in this paper, and the controller was designed for the active control system, the controller is based on ARM Cortex M3 microcontroller core, ICP series acceleration sensor is use for signal acquisition module, the A / D converter module was designed based on ADS1158 chip, the D/ A converter module was designed based on DAC8564 chip. The controller has the characteristics of high speed and versatility.
Style APA, Harvard, Vancouver, ISO itp.
7

Chen, Sui, Lu Peng, and Samuel Irving. "Accelerating GPU Hardware Transactional Memory with Snapshot Isolation." ACM SIGARCH Computer Architecture News 45, no. 2 (2017): 282–94. http://dx.doi.org/10.1145/3140659.3080204.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Omar, Hamza, and Omer Khan. "PRISM." ACM Transactions on Architecture and Code Optimization 18, no. 3 (2021): 1–25. http://dx.doi.org/10.1145/3450523.

Pełny tekst źródła
Streszczenie:
Multicores increasingly deploy safety-critical parallel applications that demand resiliency against soft-errors to satisfy the safety standards. However, protection against these errors is challenging due to complex communication and data access protocols that aggressively share on-chip hardware resources. Research has explored various temporal and spatial redundancy-based resiliency schemes that provide multicores with high soft-error coverage. However, redundant execution incurs performance overheads due to interference effects induced by aggressive resource sharing. Moreover, these schemes
Style APA, Harvard, Vancouver, ISO itp.
9

Cho, Yeongpil. "Fine-Grained Isolation to Protect Data against In-Process Attacks on AArch64." Electronics 9, no. 2 (2020): 236. http://dx.doi.org/10.3390/electronics9020236.

Pełny tekst źródła
Streszczenie:
In-process attacks are a new class of attacks that circumvent protection schemes centered around inter-process isolation. Against these attacks, researchers have proposed fine-grained data isolation schemes that can protect sensitive data from malicious accesses even during the same process. Their proposals based on salient hardware features, such as ARM® processor architecture’s domain protection, are quite successful, but it cannot be applied to a specific architecture, namely AArch64, as this does not provide the same hardware features. In this paper, therefore, we present Sealer, a fine-gr
Style APA, Harvard, Vancouver, ISO itp.
10

Verghese, Ben, Anoop Gupta, and Mendel Rosenblum. "Performance isolation." ACM SIGOPS Operating Systems Review 32, no. 5 (1998): 181–92. http://dx.doi.org/10.1145/384265.291044.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

LI, Xiao-Qing, Xiao-Dong ZHAO, and Qing-Kai ZENG. "One-Way Isolation Execution Model Based on Hardware Virtualization." Journal of Software 23, no. 8 (2012): 2207–22. http://dx.doi.org/10.3724/sp.j.1001.2012.04131.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Maene, Pieter, Johannes Gotzfried, Ruan de Clercq, Tilo Muller, Felix Freiling, and Ingrid Verbauwhede. "Hardware-Based Trusted Computing Architectures for Isolation and Attestation." IEEE Transactions on Computers 67, no. 3 (2018): 361–74. http://dx.doi.org/10.1109/tc.2017.2647955.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Zhang, Li Guo, and Jing Gao. "Switch Module Designed to Meet the EPS Reliability Intelligent Control." Applied Mechanics and Materials 623 (August 2014): 195–201. http://dx.doi.org/10.4028/www.scientific.net/amm.623.195.

Pełny tekst źródła
Streszczenie:
This paper considers the design of switch module. It is a key part of intelligent control emergency power supply. The working reliability of the switch module is an important performance index. Firstly, paper according to the characteristics that watchdog microprocessor software vulnerabilities and a control state to maintain after crash recovery, the design software reset and hardware reset propose two solutions. Next, data acquisition and data communications hardware are using photoelectric isolation technology. To achieve true electrical isolation, the system uses three power supply witch a
Style APA, Harvard, Vancouver, ISO itp.
14

Janz, Viktor, Georgi I. Wassilew, Carsten F. Perka, and Michael Müller. "Cerclages after Femoral Osteotomy Are at Risk for Bacterial Colonization during Two-Stage Septic Total Hip Arthroplasty Revision." Journal of Bone and Joint Infection 3, no. 3 (2018): 138–42. http://dx.doi.org/10.7150/jbji.24819.

Pełny tekst źródła
Streszczenie:
Abstract. Aims: In cases of a two-stage septic total hip arthroplasty (THA) exchange a femoral osteotomy with subsequent cerclage stabilization may be necessary to remove a well-fixed stem. This study aims to investigate the rate of bacterial colonization and risk of infection persistence associated with in situ cerclage hardware in two-stage septic THA exchange.Patients and Methods: Twenty-three patients undergoing two-stage THA exchange between 2011 and 2016 were included in this retrospective cohort study. During the re-implantation procedure synovial fluid, periprosthetic tissue samples an
Style APA, Harvard, Vancouver, ISO itp.
15

Zhao, WenHan, Feng Wen, Chen Han, Zhoujian Chu, Qingyue Yao, and Kesong Ji. "Development of GIS Switch State Judgment System Based on Image Recognition." Journal of Physics: Conference Series 2065, no. 1 (2021): 012009. http://dx.doi.org/10.1088/1742-6596/2065/1/012009.

Pełny tekst źródła
Streszczenie:
Abstract Aiming at the fast opening and closing speed of the GIS isolation/grounding switch, manual observation is more difficult, so it is difficult to judge the current switch status. This paper proposes an OpenCV-based image identification algorithm to identify the position of the switch movable contact during the opening and closing process of the isolating switch, thereby judging the state of the isolating switch. This system uses Raspberry Pi as the main hardware core, the server drives the CMOS camera through Raspberry Pi 4B, collects image information in the GIS optical observation win
Style APA, Harvard, Vancouver, ISO itp.
16

Hategekimana, Festus, Taylor JL Whitaker, Md Jubaer Hossain Pantho, and Christophe Bobda. "IoT Device security through dynamic hardware isolation with cloud-Based update." Journal of Systems Architecture 109 (October 2020): 101827. http://dx.doi.org/10.1016/j.sysarc.2020.101827.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Wahbe, Robert, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. "Efficient software-based fault isolation." ACM SIGOPS Operating Systems Review 27, no. 5 (1993): 203–16. http://dx.doi.org/10.1145/173668.168635.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Goli, Mehran, Muhammad Hassan, Daniel Große, and Rolf Drechsler. "Security validation of VP-based SoCs using dynamic information flow tracking." it - Information Technology 61, no. 1 (2019): 45–58. http://dx.doi.org/10.1515/itit-2018-0027.

Pełny tekst źródła
Streszczenie:
Abstract Modern System-on-Chips (SoCs) are notoriously insecure. Hence, the fundamental security feature of IP isolation is heavily used, e. g., secured Memory Mapped IOs (MMIOs), or secured address ranges in case of memories, are marked as non-accessible. One way to provide strong assurance of security is to define isolation as information flow policy in hardware using the notion of non-interference. Since, an insecure hardware opens up the door for attacks across the entire system stack (from software down to hardware), the security validation process should start as early as possible in the
Style APA, Harvard, Vancouver, ISO itp.
19

Jagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.

Pełny tekst źródła
Streszczenie:
As optical network functions increasingly adopt microservice architectures, traditional con- tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser- vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control func
Style APA, Harvard, Vancouver, ISO itp.
20

Karnopp, D. "Active and Semi-Active Vibration Isolation." Journal of Mechanical Design 117, B (1995): 177–85. http://dx.doi.org/10.1115/1.2836452.

Pełny tekst źródła
Streszczenie:
In the five decades since the founding of the ASME Design Engineering Division, the important problem of vibration isolation has been attacked first through the design of passive spring-damper suspensions and later by the use of active and semi-active elements. This paper reviews the historical development of theoretical concepts necessary for the design of isolation systems and indicates how control theory began to influence vibration isolation in the last half of this period. Practical active and semi-active suspensions have only recently become possible with the advent of powerful but relat
Style APA, Harvard, Vancouver, ISO itp.
21

Karnopp, D. "Active and Semi-Active Vibration Isolation." Journal of Vibration and Acoustics 117, B (1995): 177–85. http://dx.doi.org/10.1115/1.2838660.

Pełny tekst źródła
Streszczenie:
In the five decades since the founding of the ASME Design Engineering Division, the important problem of vibration isolation has been attacked first through the design of passive spring-damper suspensions and later by the use of active and semi-active elements. This paper reviews the historical development of theoretical concepts necessary for the design of isolation systems and indicates how control theory began to influence vibration isolation in the last half of this period. Practical active and semi-active suspensions have only recently become possible with the advent of powerful but relat
Style APA, Harvard, Vancouver, ISO itp.
22

Wu, Bojian, Yujie Zhao, Song Wang, and Zongfeng Li. "The Ground Test System of Double Layer Air Floating Platform and Its Application." Journal of Physics: Conference Series 2562, no. 1 (2023): 012034. http://dx.doi.org/10.1088/1742-6596/2562/1/012034.

Pełny tekst źródła
Streszczenie:
Abstract The suspension test system within the high microgravity scientific experiment cabinet is equipped with double-layer vibration isolation, effectively isolating external disturbances and creating a high microgravity environment within the inner body. Based on this characteristic, this paper proposes a double-layer plane air platform ground test system design. By using a high-precision acceleration sensor and gyroscope of the suspension test platform, the system coordinates the measurement of the double-layer air floating platform. The control mode and algorithm for double-layer vibratio
Style APA, Harvard, Vancouver, ISO itp.
23

Rathore, Muhammad Siraj. "KVM vs. LXC: Comparing Performance and Isolation of Hardware-assisted Virtual Routers." American Journal of Networks and Communications 2, no. 4 (2013): 88. http://dx.doi.org/10.11648/j.ajnc.20130204.11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Rivera, J. Germán. "Hardware-Based Data Protection/Isolation at Runtime in Ada Code for Microcontrollers." ACM SIGAda Ada Letters 37, no. 2 (2018): 43–50. http://dx.doi.org/10.1145/3232693.3232705.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Lu, Qi, and M. Satyanaranyanan. "Isolation-only transactions for mobile computing." ACM SIGOPS Operating Systems Review 28, no. 2 (1994): 81–87. http://dx.doi.org/10.1145/198153.198164.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Ivić, Igor R. "Statistical Evaluation of Time Multiplexing to Mitigate Differential Reflectivity Bias Due to Cross-Polar Coupling." Journal of Atmospheric and Oceanic Technology 33, no. 1 (2016): 127–47. http://dx.doi.org/10.1175/jtech-d-14-00224.1.

Pełny tekst źródła
Streszczenie:
AbstractOne of the main challenges to the use of phased array radar for weather observations is the implementation of dual polarization with acceptable levels of cross-polar fields induced by the antenna. For example, to achieve acceptable differential reflectivity (ZDR) bias (e.g., less than 0.1 dB) using simultaneous transmission and reception of H and V polarized waves, the isolation between coaxial cross-polar and copolar beams needs to be in excess of 50 dB. Because such isolation cannot be achieved at an affordable price by antenna hardware, additional methods are required to attain supp
Style APA, Harvard, Vancouver, ISO itp.
27

Xu, Xian Cheng, and Chuan You Yuan. "A New Method for Security Isolation and Data Transfer." Applied Mechanics and Materials 701-702 (December 2014): 902–6. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.902.

Pełny tekst źródła
Streszczenie:
This paper presents both physical and logical methods that are completely one-way transmission without feedback. The imposed hardware isolation is achieved based on the light transmission property with low cost optic components, while the efficiency and accuracy of data transmission is guaranteed by defining new protocol structure based on UDP. Experiments demonstrate that high performance have been achieved after using our proposed protocol mechanism.
Style APA, Harvard, Vancouver, ISO itp.
28

Jyoti Singh. "Transactional Memory without Hardware Support: A Comprehensive Software-Driven Approach." Panamerican Mathematical Journal 35, no. 1 (2024): 188–98. https://doi.org/10.52783/pmj.v35.i1.5048.

Pełny tekst źródła
Streszczenie:
Transactional memory (TM) simplifies concurrent programming by enabling code blocks to execute in isolation, eliminating the complexities of locks and ensuring data con- sistency. While hardware-based TM (HTM) offers performance advantages, it faces limitations in scalability, flexibility, and hardware dependency. This paper presents a comprehensive anal- ysis of software transactional memory (STM), offering a robust alternative that operates without hardware support. We explore various STM techniques, their implementation challenges, and performance trade-offs compared to HTM. Additionally, w
Style APA, Harvard, Vancouver, ISO itp.
29

Piao, Chang Hao, and Teng Cong. "Study on Isolation Monitoring of High-Voltage Battery System." Applied Mechanics and Materials 44-47 (December 2010): 571–75. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.571.

Pełny tekst źródła
Streszczenie:
After comparing the pros and cons of various isolation monitoring methods, this article presents the isolation monitoring method which based on unbalanced bridge and the characteristics of high-voltage battery system. Battery is an important component for Hybird-electric vehicle. The safety of high-voltage battery system is important specification for Hybird-electric vehicle. This device which uses Freescale’s 16-bit microcontroller with CAN communications capabilities achieve real-time and accurate measurement of isolation resistance of high-voltage battery system. The article focuses on the
Style APA, Harvard, Vancouver, ISO itp.
30

Zverev, M., V. Vostrikova, and D. Teselkin. "Recovering Information from Wireless Sensors in Hardware and Software Platforms." Journal of Physics: Conference Series 2096, no. 1 (2021): 012030. http://dx.doi.org/10.1088/1742-6596/2096/1/012030.

Pełny tekst źródła
Streszczenie:
Abstract The work considers the task of information processing in a subsystem of the hardware-software platform of the simulator complex - a mobile system of simulating isolation breathing apparatuses. The problem of predicting values when data packets are lost during their wireless transmission has been revealed. To solve the problem, an algorithm for data processing based on neural network technology has been developed, which allows reducing the number of data packet losses by predicting the lost values. The experimental studies confirmed the adequacy and effectiveness of the proposed algori
Style APA, Harvard, Vancouver, ISO itp.
31

Hafaifa, Ahmed, Ferhat Laaouad, and Kouider Laroussi. "Fuzzy modeling and control for detection and isolation of surge in industrial centrifugal compressors." Journal of Automatic Control 19, no. 1 (2009): 19–26. http://dx.doi.org/10.2298/jac0901019h.

Pełny tekst źródła
Streszczenie:
This paper provides the possible application of the fuzzy approaches in fault detection and isolation area for a class of complex industrial processes with uncertain interval parameters. The main idea of fuzzy fault detection and isolation is to build a model of a diagnosis procedures, using rules-based Fuzzy Expert System, capable to minimize false alarms enhance detectability and isolability and minimize detection time by hardware implementation to improve reliability, safety and global efficiency. This paper illustrates an alternative implementation to the compression systems supervision ta
Style APA, Harvard, Vancouver, ISO itp.
32

Busi, Matteo, Job Noorman, Jo Van Bulck, et al. "Securing Interruptible Enclaved Execution on Small Microprocessors." ACM Transactions on Programming Languages and Systems 43, no. 3 (2021): 1–77. http://dx.doi.org/10.1145/3470534.

Pełny tekst źródła
Streszczenie:
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken, the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features brings a risk of introducing new software-based side-channel attacks. This article studies the problem of extending a processor with new features without weakening the security of the isolation mechan
Style APA, Harvard, Vancouver, ISO itp.
33

Jain, Shvetank, Fareha Shafique, Vladan Djeric, and Ashvin Goel. "Application-level isolation and recovery with solitude." ACM SIGOPS Operating Systems Review 42, no. 4 (2008): 95–107. http://dx.doi.org/10.1145/1357010.1352603.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Park, Woojung, Haeyoung Kim, Janghyun Ji, Jaegeun Moon, and Howon Kim. "Lightweight RISC-V Trusted Execution Environment with Hardware-based Encryption and Memory Isolation." Journal of Digital Contents Society 23, no. 9 (2022): 1813–22. http://dx.doi.org/10.9728/dcs.2022.23.9.1813.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Hao, Jingjing, and Michel Kinnaert. "Sensor fault detection and isolation over wireless sensor network based on hardware redundancy." Journal of Physics: Conference Series 783 (January 2017): 012006. http://dx.doi.org/10.1088/1742-6596/783/1/012006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Begum, Hajira, and Abdul Rashid. "EchoSense - (Audio Visual Framework for Active Speaker Isolation)." International Research Journal of Computer Science 12, no. 04 (2025): 165–70. https://doi.org/10.26562/irjcs.2025.v1204.09.

Pełny tekst źródła
Streszczenie:
This paper presents EchoSense, a Google Chrome extension designed to enhance speech intelligibility in noisy environments through the fusion of audio and visual cues. It leverages computer vision (face-api.js) for speaker identification using lip movement detection and applies RNNoise, a recurrent neural network-based model, for real-time noise suppression. The system integrates the Web Audio API and WebRTC for in-browser audio-video processing, enabling speaker-focused filtering without the need for external hardware or cloud services. Preliminary evaluations show that EchoSense effectively s
Style APA, Harvard, Vancouver, ISO itp.
37

Roshanravan, Sajad, and Saeed Shamaghdari. "Simultaneous fault detection and isolation and fault-tolerant control using supervisory control technique: asynchronous switching approach." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering 234, no. 8 (2019): 900–911. http://dx.doi.org/10.1177/0959651819893891.

Pełny tekst źródła
Streszczenie:
This article focuses on the design of a novel active fault-tolerant control scheme based on supervisory control technique for a class of nonlinear systems. This framework relies on a supervisory switching among a finite family of predesigned candidate controllers, which simultaneously performs isolation and accommodation of intermittent faults. This method does not require any additional model or filter bank for fault isolation. Two controller switching algorithms are introduced based on the dwell time and state which are designed especially for this purpose. There is often some time delay bet
Style APA, Harvard, Vancouver, ISO itp.
38

Choi, Joseph I., and Kevin R. B. Butler. "Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities." Security and Communication Networks 2019 (April 2, 2019): 1–28. http://dx.doi.org/10.1155/2019/1368905.

Pełny tekst źródła
Streszczenie:
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations. Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. This paper revisits the history of improvements to SMC o
Style APA, Harvard, Vancouver, ISO itp.
39

Rybakov, S. A., and N. Yu Polyakov. "Input/output virtualization of Elbrus microprocessors." Radio industry (Russia) 30, no. 3 (2020): 34–39. http://dx.doi.org/10.21778/2413-9599-2020-30-3-34-39.

Pełny tekst źródła
Streszczenie:
The article describes and compares the methods of input-output (I/O) virtualization, adapted for the Elbrus architecture. The presented methods of software emulation and paravirtualization of devices do not require hardware support and provide complete isolation of real devices from virtual ones at the hypervisor level, which allows for better consolidation of physical I/O. Direct assignment of the device to the guest provides better performance over the other methods, but requires hardware modifications in the I/O Memory Management Unit (IOMMU). Hardware support for I/O virtualization was imp
Style APA, Harvard, Vancouver, ISO itp.
40

Majumder, Shibarchi, Jens Frederik Dalsgaard Nielsen, Thomas Bak, and Anders la Cour-Harbo. "Reliable flight control system architecture for agile airborne platforms: an asymmetric multiprocessing approach." Aeronautical Journal 123, no. 1264 (2019): 840–62. http://dx.doi.org/10.1017/aer.2019.30.

Pełny tekst źródła
Streszczenie:
AbstractSystem software subsystems in an unmanned aircraft system share hardware resources due to space, weight, and power constraints. Such subsystems have different criticality, requirements, and failure rates, and can cause undesired interference when sharing the same hardware. A component with high failure rate can reduce the reliability of the system unless a fault containment mechanism is adopted.This work proposes an asymmetric multiprocessor architecture to establish isolation at the hardware level for distributed implementation of safety-critical subsystems along with user defined pay
Style APA, Harvard, Vancouver, ISO itp.
41

Chen, Cong, Zhong Hong, and Jian-Min Jiang. "Scheduling in Real-Time Mobile Systems." ACM Transactions on Embedded Computing Systems 21, no. 3 (2022): 1–36. http://dx.doi.org/10.1145/3517747.

Pełny tekst źródła
Streszczenie:
To guarantee the safety and security of a real-time mobile system such as an intelligent transportation system, it is necessary to model and analyze its behaviors prior to actual development. In particular, the mobile objects in such systems must be isolated from each other so that they do not collide with each other. Since isolation means two or more mobile objects must not be located in the same place at the same time, a scheduling policy is required to control and coordinate the movement of such objects. However, traditional scheduling theories are based on task scheduling which is coarse-g
Style APA, Harvard, Vancouver, ISO itp.
42

Majumder, S., J. F. D. Nielsen, A. La Cour-Harbo, H. Schiøler, and T. Bak. "A real-time on-chip network architecture for mixed criticality aerospace systems." Aeronautical Journal 123, no. 1269 (2019): 1788–806. http://dx.doi.org/10.1017/aer.2019.80.

Pełny tekst źródła
Streszczenie:
ABSTRACTIntegrated Modular Avionics enables applications of different criticality levels to share the same hardware platform with an established temporal and spatial isolation. On-chip communication systems for such platforms must support different bandwidth and latency requirements of applications while preserving time predictability. In this paper, our concern is a time-predictable on-chip network architecture for targeting applications in mixed-criticality aerospace systems. The proposed architecture introduces a mixed, priority-based and time-division-multiplexed arbitration scheme to acco
Style APA, Harvard, Vancouver, ISO itp.
43

Whitaker, Andrew, Marianne Shaw, and Steven D. Gribble. "Scale and performance in the Denali isolation kernel." ACM SIGOPS Operating Systems Review 36, SI (2002): 195–209. http://dx.doi.org/10.1145/844128.844147.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Russinovich, Mark. "Confidential Computing: Elevating Cloud Security and Privacy." Queue 21, no. 4 (2023): 44–48. http://dx.doi.org/10.1145/3623461.

Pełny tekst źródła
Streszczenie:
Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It provides a novel, clearly defined security boundary, isolating sensitive data within trusted execution environments during computation. This means services can be designed that segment data based on least-privilege access principles, while all other code in the system sees only encrypted data. Crucially, the isolation is rooted in novel hardware primitives, effe
Style APA, Harvard, Vancouver, ISO itp.
45

Wang, Jiyuan, Yuxin Qiu, Ben Limpanukorn, Hong Jin Kang, Qian Zhang, and Miryung Kim. "DuoReduce: Bug Isolation for Multi-layer Extensible Compilation." Proceedings of the ACM on Software Engineering 2, FSE (2025): 647–67. https://doi.org/10.1145/3715747.

Pełny tekst źródła
Streszczenie:
In recent years, the MLIR framework has had explosive growth due to the need for extensible deep learning compilers for hardware accelerators. Such examples include Triton, CIRCT, and ONNX-MLIR. MLIR compilers introduce significant complexities in localizing bugs or inefficiencies because of their layered optimization and transformation process with compilation passes. While existing delta debugging techniques can be used to identify a minimum subset of IR code that reproduces a given bug symptom, their naive application to MLIR is time-consuming because real-world MLIR compilers usually invol
Style APA, Harvard, Vancouver, ISO itp.
46

Shankar, Sanjeev. "Best Practices for Debugging Embedded Software." European Journal of Computer Science and Information Technology 13, no. 42 (2025): 133–46. https://doi.org/10.37745/ejcsit.2013/vol13n42133146.

Pełny tekst źródła
Streszczenie:
This article explores effective debugging strategies for embedded systems that operate under hardware constraints, real-time requirements, and limited visibility. It begins by emphasizing the importance of understanding system fundamentals, including microcontroller architecture, memory layouts, interrupt structures, and communication protocols. The work presents systematic debugging approaches centered on problem reproduction, component isolation, and regression testing, alongside an examination of hardware-based debugging tools such as JTAG/SWD interfaces, in-circuit emulators, oscilloscopes
Style APA, Harvard, Vancouver, ISO itp.
47

Valente, Giacomo, Paolo Giammatteo, Vittoriano Muttillo, Luigi Pomante, and Tania Di Mascio. "A Lightweight, Hardware-Based Support for Isolation in Mixed-Criticality Network-on-Chip Architectures." Advances in Science, Technology and Engineering Systems Journal 4, no. 4 (2019): 561–73. http://dx.doi.org/10.25046/aj040467.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Wang, Tan, Juncheng Li, Pei Li, and Jianyu Liu. "In-band full-duplex technology in VDES: a hardware implementation for high isolation in the analogue domain." Journal of Physics: Conference Series 2991, no. 1 (2025): 012025. https://doi.org/10.1088/1742-6596/2991/1/012025.

Pełny tekst źródła
Streszczenie:
Abstract In-band full-duplex technology can transmit and receive information in the same frequency band at the same time, which can greatly improve the throughput and spectrum utilization of the communication system. In this paper, the in-band full-duplex technology is applied to the VHF Data Exchange System (VDES) to eliminate the self-interference signal and improve the isolation between transceiver links in the 160 MHz frequency band. The time-domain reconstruction method is used to design the scheme for two narrow frequency bands of VDES. An RF cancellation board is designed to reconstruct
Style APA, Harvard, Vancouver, ISO itp.
49

Singh, Ranu, and Dr Monika Kapoor. "Self-Healing Hardware Systems: Integrating Fault Tolerance for Enhanced Reliability and Performance." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem02848.

Pełny tekst źródła
Streszczenie:
Self-healing hardware systems are designed to autonomously detect, diagnose, and recover from faults, ensuring uninterrupted operation and improved system reliability. Fault tolerance plays a crucial role in these systems by implementing strategies that mitigate failures and maintain performance in critical applications such as aerospace, medical devices, and autonomous systems. As hardware complexity increases, effective fault-tolerant mechanisms become essential to enhance resilience and longevity. This paper explores fundamental fault tolerance techniques in self-healing systems, including
Style APA, Harvard, Vancouver, ISO itp.
50

Bustamante, Ricardo, Gilberto Mosqueda, and Minkyu Kim. "Enhanced Seismic Protection System for an Emergency Diesel Generator Unit." Energies 15, no. 5 (2022): 1728. http://dx.doi.org/10.3390/en15051728.

Pełny tekst źródła
Streszczenie:
Nuclear power plants are required to maintain operation after an earthquake, leading to a safe shutdown if necessary. In the case of a loss of offsite power, the onsite emergency diesel generator is critical to ensure procedural operations of the nuclear power plant. As a means to reduce the overall seismic risk, a three-dimensional seismic protection system is proposed to enhance the seismic performance of the emergency diesel generator. The proposed seismic isolation system decouples the horizontal and vertical components of shaking and considers available hardware to achieve an effective is
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!