Filters








7,406 Hits in 5.5 sec

A hardware architecture for implementing protection rings

Michael D. Schroeder, Jerome H. Saltzer
1972 Communications of the ACM  
This paper describes hardware processor mechanisms for implementing these rings of protection.  ...  In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation.  ...  Hardware Implementation of Rings In this section the ideas presented in the previous sections are gathered into a description of a design for processor hardware to implement rings.  ... 
doi:10.1145/361268.361275 fatcat:ypbh6cdizjddzdwufqwnkf32ey

A hardware architecture for implementing protection rings

Michael D. Schroeder, Jerome H. Saltzer
1971 Proceedings of the third symposium on Operating systems principles - SOSP '71  
This paper describes hardware processor mechanisms for implementing these rings of protection.  ...  In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation.  ...  The Hardware Implementation of Rings In this section the ideas presented in the previous sections are gathered into a description of a design for processor hardware to implement rings.  ... 
doi:10.1145/800212.806498 dblp:conf/sosp/SchroederS71 fatcat:f3fxqui7bvbvhm7u7ve2rdcgaq

A hardware architecture for implementing protection rings

Michael D. Schroeder, Jerome H. Saltzer
1972 ACM SIGOPS Operating Systems Review  
This paper describes hardware processor mechanisms for implementing these rings of protection.  ...  In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation.  ...  Hardware Implementation of Rings In this section the ideas presented in the previous sections are gathered into a description of a design for processor hardware to implement rings.  ... 
doi:10.1145/850614.850623 fatcat:4vaqzthtovclthsejye3hieogi

Abstractions for Practical Virtual Machine Replay

Anton Burtsev, David Johnson, Mike Hibler, Eric Eide, John Regehr
2016 Proceedings of the12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments - VEE '16  
We present a design blueprint-a set of abstractions, general principles, and low-level implementation details-for efficient deterministic replay in a modern hypervisor.  ...  While implementing deterministic replay is hard, we argue that the main reason is the lack of general abstractions for understanding and addressing the significant engineering challenges involved in the  ...  Acknowledgments We thank the anonymous VEE '16 reviewers for their helpful comments. We performed our experiments on machines provided by the Utah Emulab testbed [47] .  ... 
doi:10.1145/2892242.2892257 dblp:conf/vee/BurtsevJHER16 fatcat:vszr2bmn7fg4doesvf65x36eny

An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms

Guillaume Averlant, Benoit Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaaniche
2017 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)  
The study focuses on Intel and ARM architectures, and outlines various hardware isolation resources that provide a security layer to the software running on these architectures.  ...  A comparative analysis of these architectures is also presented together with a discussion of open issues and future challenges.  ...  A detailed presentation of hardware security mechanisms is provided in [5] for Intel architectures and, in a similar way, in [17] for ARM architectures.  ... 
doi:10.1109/prdc.2017.48 dblp:conf/prdc/AverlantMANK17 fatcat:axr3ro6c5jcphfw5zzqxowfuua

Toward an Abstract Model of Programmable Data Plane Devices [article]

Debobroto Das Robin, Dr. Javed I. Khan
2020 arXiv   pre-print
Innovation and improvement in hardware design and development is bringing various new architectures for data plane. Data plane is becoming more programmable then ever before.  ...  A common abstract model of data plane is required to develop complex application over these heterogeneous data plane devices.  ...  Though a common abstraction layer over heterogeneous hardware architecture has various advantages, but restricting to a single abstract model of hardware closes the door for future innovation in both hardware  ... 
arXiv:2008.08697v1 fatcat:tjmtp4vmyvgxrhbqiintmvow2e

Abstract [chapter]

2017 Practical Engineering Design  
A wide variety of references are listed.  ...  Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their  ...  , and protects against a typical temperature of hot coffee.  ... 
doi:10.1201/9781315275895-16 fatcat:j5buf6iiijge7eb3qsbbtg4ftu

Self-stabilizing symmetry breaking in constant-space (extended abstract)

Alain Mayer, Yoram Ofek, Rafail Ostrovsky, Moti Yung
1992 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing - STOC '92  
Requiring only constant-size messages and message-passing model has practical implications: our solution can be implemented in high-speed networks using a universal fast hardware switches i.e., nite state  ...  We note that Dijkstra showed that the last problem does not have a deterministic solution even when the identical processors possess an arbitrary power: starting from a ring with a multitude of tokens,  ...  Acknowledgments We are happy to thank Yehuda Afek, Baruch A w erbuch, Amotz Bar-Noy, Shay Kutten, Sergio Rajsbaum, and Baruch Schieber for helpful discussions.  ... 
doi:10.1145/129712.129777 dblp:conf/stoc/MayerOOY92 fatcat:2prmlah2fjaq3j6xh4h4n73uoi

Towards a Stateful Forwarding Abstraction to Implement Scalable Network Functions in Software and Hardware [article]

Luca Petrucci, Nicola Bonelli, Marco Bonola, Gregorio Procissi, Carmelo Cascone, Davide Sanvito, Salvatore Pontarelli, Giuseppe Bianchi, Roberto Bifulco
2016 arXiv   pre-print
An effective packet processing abstraction that leverages software or hardware acceleration techniques can simplify the implementation of high-performance virtual network functions.  ...  We find that supporting a flow-level programming consistency model is an important feature of a programming abstraction in this context.  ...  While we leveraged an FPGAbased hardware implementation and provided a software implementation, it would be interesting to verify how different architectures would implement the OPP abstraction.  ... 
arXiv:1611.02853v1 fatcat:igcgenk7gff4vgfngwjcours74

Abstracts of Current Computer Literature

1969 IEEE transactions on computers  
tion 6487 -see also Displays H Hardware Hardware and Software Implementations of a Fast Fourier Transform Algorithm 6496 -see also Computers, Displays, Stot-age Heuristic Heuristic Simplification  ...  The checking logic and a practical method for its implementation are derived.  ... 
doi:10.1109/t-c.1969.222625 fatcat:n6paydv7k5aaphhvk5wom2xplu

Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation

Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
2016 IEEE Transactions on Information Forensics and Security  
Full homomorphism over addition and multiplication, which is necessary for enabling general-purpose computation, is achieved by inventing a heuristically obfuscated software re-encryption module written  ...  The program operands are protected using the Paillier partially homomorphic cryptosystem, which supports addition on the encrypted domain.  ...  Its abstract machine is easily implemented both in hardware and emulating software, as it is sufficiently simple and computationally efficient compared to other OISC variants.  ... 
doi:10.1109/tifs.2016.2569062 fatcat:n2jztvxbfneaxac73enzkmrqgy

ABSTRACTING LOW-LEVEL APIS FOR CROSS-PLATFORM GRAPHICS APPLICATION DEVELOPMENT
ABSTRAGIROVANIE NIZKOUROVNEVYKh API PRI SOZDANII KROSSPLATFORMENNYKh GRAFIChESKIKh PRILOZhENII

V. D. Shakaev, О. А. Shabalina
2014 Vestnik komp iuternykh i informatsionnykh tekhnologii  
Therefore, the first part of the thesis focuses on the design and implementation of a rendering engine for major current-gen platforms, such as Microsoft Windows, the Microsoft XBox360, Sony's PlayStation  ...  Ort, Datum: Unterschrift: Abstract With hardware capabilities and customer expectations rising every new game console generation, efficient visibility algorithms become a more and more crucial part of  ...  Fixed-size queue The fixed-size queue is internally implemented as a ring-buffer of elements, using separate indices for read and write operations.  ... 
doi:10.14489/vkit.2014.08.pp.011-016 fatcat:haexayusvnfe3pf7dmo6oldija

Abstracts of Current Computer Literature

1972 IEEE transactions on computers  
In order to do this, output functions and other data manipulathe goal of low memory construction costs. an abstract model for a program and its exe-tions.  ...  nosis, and reconfiguration for hardware, data processor.  ...  The Clenshaw-Curtis method for numerial formance, provides extremely useful assisintegration can be implemented with either tance in performing a circuit design.  ... 
doi:10.1109/tc.1972.5008995 fatcat:l23nba4luvcqplvskg7jcakria

Hardware-Software Co-Design: Not Just a Cliché

Adrian Sampson, James Bornholt, Luis Ceze, Marc Herbstritt
2015 Summit on Advances in Programming Languages  
The age of the air-tight hardware abstraction is over.  ...  It is time to embrace hardware-software co-design in earnest, to cooperate between programming languages and architecture to upend legacy constraints on computing.  ...  An additional 12 pp is due to switching protection modes between ring 0 (kernel) and ring 3 (application) on control transfers.  ... 
doi:10.4230/lipics.snapl.2015.262 dblp:conf/snapl/SampsonBC15 fatcat:w53z5tuoujcx5eqfyn4c5s5eau

Abstract of Doctoral Dissertation

1977 The Financial Review  
I conclude that the most important legal challenges to future information businesses are within the areas of privacy and data protection; intellectual property rights; and contracts.  ...  I have developed a scenario-based method that produces lists of legal challenges and helps to analyze them.  ...  In general, a patent protects an idea reduced to practice. That is, it does not protect totally abstract ideas nor only new implementations or expressions of ideas.  ... 
doi:10.1111/j.1540-6288.1977.tb00954.x fatcat:ytm3zbtttjft5euxe4qwiu3lui
« Previous Showing results 1 — 15 out of 7,406 results