Results 1 to 10 of about 1,840,047 (194)

Direct Memory Access-Based Data Storage for Long-Term Acquisition Using Wearables in an Energy-Efficient Manner [PDF]

open access: yesSensors
This study introduces a lightweight storage system for wearable devices, aiming to optimize energy efficiency in long-term and continuous monitoring applications.
Cosmin C. Dobrescu   +4 more
doaj   +3 more sources

Direct virtual memory access from FPGA for high-productivity heterogeneous computing [PDF]

open access: yes2013 International Conference on Field-Programmable Technology (FPT), 2013
Heterogeneous computing utilizing both CPU and FPGA requires access to data in the main memory from both devices. While a typical system relies on software executing on the CPU to orchestrate all data movements between the FPGA and the main memory, our demo presents a complementary FPGA-centric approach that allows gateware to directly access the ...
So, HKH, Ng, HC, Choi, YM
semanticscholar   +5 more sources

Position Paper:Defending Direct Memory Access with CHERI Capabilities [PDF]

open access: yesHardware and Architectural Support for Security and Privacy, 2020
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security.
Markettos, A Theodore   +5 more
openaire   +2 more sources

An approach to Direct Memory Access module verification [PDF]

open access: yesТруды Института системного программирования РАН, 2018
A method of direct memory access subsystem verification used for “Elbrus” series microprocessors has been described. A peripheral controller imitator has been developed in order to reduce verification overhead.
V. . Kutsevol   +3 more
doaj   +3 more sources

Design and Implementation of a Direct Memory Access Controller for Embedded Applications

open access: yesInternational Journal of Technology, 2019
In this paper, we propose a design and implementation of a Direct Memory Access Controller (DMAC) as a part of an SoC. The main purpose of the DMAC design is to integrate it into a System on a Chip (SoC) for the exchange of a large volume of data ...
Mohammed Altaf Ahmed   +2 more
doaj   +2 more sources

Data acquisition with direct memory access [PDF]

open access: yesComputer Science Journal of Moldova, 1999
This paper is concerned about using Direct Memory Access (DMA) transfer for real-time data acquisitions from a plug-in data acquisition board Aquarius DSP-1.
Iu. Guzun
doaj   +1 more source

A High-Speed Dynamic Partial Reconfiguration Controller Using Direct Memory Access Through a Multiport Memory Controller and Overclocking with Active Feedback

open access: yesInternational Journal of Reconfigurable Computing, 2011
Dynamically reconfigurable computing platforms provide promising methods for dynamic management of hardware resources, power, and performance. Yet, progress in dynamically reconfigurable computing is fundamentally limited by the reconfiguration time ...
John C. Hoffman, Marios S. Pattichis
doaj   +2 more sources

Memory Management Support for Multi-Programmed Remote Direct Memory Access (RDMA) Systems [PDF]

open access: yes2005 IEEE International Conference on Cluster Computing, 2005
Current operating systems offer basic support for network interface controllers (NICs) supporting remote direct memory access (RDMA). Such support typically consists of a device driver responsible for configuring communication channels between the device and user-level processes but not involved in data transfer.
K. Magoutis
openaire   +2 more sources

Optimizing distributed systems with remote direct memory access

open access: yes大数据, 2018
Fast network devices with RDMA support have been price-compatible with traditional network primitives such as Ethernet,and it’s now widely deployed in modern data centers.RDMA can be used in two ways.Firstly,it can optimize the messaging primitive in ...
Xingda WEI, Rong CHEN, Haibo CHEN
doaj   +1 more source

High-Performance NTRU Accelerator Using a Direct Memory Access Controller

open access: yesIEEE Access
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy