Results 61 to 70 of about 5,262 (215)

Punxa: A Python‐Based RISC‐V System Simulator for Education

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
This work introduces an interactive co‐simulation framework that helps students understand computer architecture by bridging hardware and software analysis. Prioritizing detailed analysis over performance, it provides an integrated environment for iterative design, performance evaluation, and debugging.
David Castells‐Rufas   +2 more
wiley   +1 more source

enCloud: Aspect‐oriented trusted service migration on SGX‐enabled cloud VM

open access: yesSoftware: Practice and Experience, Volume 54, Issue 12, Page 2454-2480, December 2024.
Abstract This paper presents enCloud, a new aspect‐oriented trusted service migration with SGX‐enabled cloud VM. Addressing the challenge of reconciling end‐to‐end security with VM migration, enCloud incorporates two key aspects: (1) end‐to‐end security for enclave context migration, and (2) VM abstraction for conventional VM context migration.
Seehwan Yoo   +4 more
wiley   +1 more source

Survey on open‐source digital twin frameworks–A case study approach

open access: yesSoftware: Practice and Experience, Volume 54, Issue 6, Page 929-960, June 2024.
Abstract Digital twin (DT) technology has been a topic with academic and industrial coverage in recent years. DTs are intended to be a virtual high‐fidelity representation of a physical counterpart. Its complex nature requires several components to create and run a DT, and that is why many DT frameworks have been proposed in the literature.
Santiago Gil   +3 more
wiley   +1 more source

Using ABI for virtual machines introspection

open access: yesТруды Института системного программирования РАН, 2018
The paper proposes an approach to introspection of virtual machines using the applications binary interface. The purpose of the method is to get information about the system, while having a minimum knowledge about its internal structure.
N. I. Fursova   +2 more
doaj   +1 more source

Designing Installations for Verification of the Model of Active Queue Management Discipline RED in the GNS3

open access: yes, 2014
The problem of RED-module mathematical model results verification, based on GNS3 experimental stand, is discussed in this article. The experimental stand consists of virtual Cisco router, traffic generator D-ITG and traffic receiver.
Korolkova, A. V.   +2 more
core   +1 more source

The progress, challenges, and perspectives of directed greybox fuzzing

open access: yesSoftware Testing, Verification and Reliability, Volume 34, Issue 2, March 2024.
Based on the investigation of 42 state‐of‐the‐art fuzzers that are closely related to directed greybox fuzzing (DGF), we conduct the first in‐depth study to summarize the empirical evidence on the research progress of DGF. By analyzing the benefits and limitations of DGF research, we try to identify gaps in current research.
Pengfei Wang   +5 more
wiley   +1 more source

Identifying exploitable memory objects for out‐of‐bound write vulnerabilities

open access: yesElectronics Letters, Volume 60, Issue 5, March 2024.
The study proposes a novel method for identifying potential exploitable memory objects. It focuses on corrupted data propagation processes and designs a corrupted data‐oriented fuzzing method. Abstract Exploiting an out‐of‐bounds write vulnerability in general‐purpose applications has become a current research focus.
Runhao Li, Bin Zhang, Chaojing Tang
wiley   +1 more source

Initial explorations of ARM processors for scientific computing

open access: yes, 2014
Power efficiency is becoming an ever more important metric for both high performance and high throughput computing. Over the course of next decade it is expected that flops/watt will be a major driver for the evolution of computer architecture.
Abdurachmanov, David   +3 more
core   +1 more source

An Emulator for Approximate Memory Platforms Based on QEmu

open access: yes, 2017
In this paper, an emulation environment for approximate memory architectures is presented. In the context of error tolerant applications, in which energy is saved at the expense of the occurrence of errors in data processing, approximate memories play a relevant part. Approximate memories are memories where read/write errors are allowed with controlled
Menichelli, Francesco   +3 more
openaire   +1 more source

Energy‐efficiency and sustainability in new generation cloud computing: A vision and directions for integrated management of data centre resources and workloads

open access: yesSoftware: Practice and Experience, Volume 54, Issue 1, Page 24-38, January 2024.
Abstract Cloud computing has become a critical infrastructure for modern society, like electric power grids and roads. As the backbone of the modern economy, it offers subscription‐based computing services anytime, anywhere, on a pay‐as‐you‐go basis. Its use is growing exponentially with the continued development of new classes of applications driven ...
Rajkumar Buyya   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy