Results 181 to 190 of about 5,262 (215)

An efficient algorithm for data transmission certainty in IIoT sensing network: A priority-based approach. [PDF]

open access: yesPLoS One
Nalbant KG   +5 more
europepmc   +1 more source

Industrial cyber range based on QEMU-IOL

2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), 2021
With the continuous deepening of the integration of informatization and industrialization, the introduction of Ethernet and wireless communication technologies has realized the interconnection and intercommunication of various business systems and field terminal equipment in the industrial control network, resulting in a sharp possibility of attacks ...
Miao Shangting, Pan Quan
openaire   +1 more source

Barrier enabled QEMU

Proceedings of the 2019 2nd International Conference on Information Science and Systems, 2019
Virtual machines can be run inside one physical machine. This advantage enables cloud service providers and data centers to provide the identical and independent services to multiple users with fewer hardware. QEMU, a virtual machine that is used widely, has the two problems. One is performance degradation due to the amplification of the sync operation.
Myeongseon Kim, Joontaek Oh, Youjip Won
openaire   +1 more source

Efficient fault injection in QEMU

2015 16th Latin-American Test Symposium (LATS), 2015
Early analysis of software dependability and fault tolerance properties requires an efficient and effective fault modelling environment before the physical prototype of the target platform is available. In this context, fault injection on cycleaccurate models implemented by means of Hardware Description Languages (HDLs) is a quite common and valid ...
PRAVADELLI, Graziano, D. Ferraretto
openaire   +1 more source

Reliable Software Design Aided by QEMU Simulation

2021 22nd IEEE International Conference on Industrial Technology (ICIT), 2021
Highly reliable systems achieve a low failure probability during their operational lifetime with the help of redundancy. This technique ensures functionality by replicating components or modules, on both software and hardware. The addition of redundancy and further architectural decisions that arise from its usage results in increased system complexity.
Rui Almeida   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy