Filters








1,458 Hits in 11.3 sec

Virtualizing mixed-criticality systems: A survey on industrial trends and issues

Marcello Cinque, Domenico Cotroneo, Luigi De Simone, Stefano Rosiello
2021 Future generations computer systems  
This work surveys the state-of-the-practice of real-time virtualization technologies by discussing common issues in the industry.  ...  Virtualization is gaining attraction in the industry as it promises a flexible way to integrate, manage, and re-use heterogeneous software components with mixed-criticality levels, on a shared hardware  ...  The seL4 [70, 71] is a formal-verified microkernel designed to be used in security-and safety-critical systems.  ... 
doi:10.1016/j.future.2021.12.002 fatcat:4q277etxfjewlpmkjcn7by42pm

Analysis and test of the effects of single event upsets affecting the configuration memory of SRAM-based FPGAs

Luca Cassano
2014 2014 International Test Conference  
Finally the comparison between fault coverages obtained by test patterns generated for the accurate model of SEUs and the fault coverages obtained by test pattern designed for stuck-at faults, shows that  ...  In this thesis we propose a set of software tools that could be used by designers of SRAM-based FPGA safety-critical applications to assess the sensitivity to SEUs of the system and to generate test patterns  ...  Time gap: For timing analysis the critical path of both ASIC and FPGA designs was considered.  ... 
doi:10.1109/test.2014.7035366 dblp:conf/itc/Cassano14 fatcat:ykg7k6finnhwpk7j6zsbtlwfkq

Energy Efficient and Fault Tolerant Multicore Wireless Sensor Network: E²MWSN

Hong-Ling Shi, Kun Mean Hou, Hai-Ying Zhou, Xing Liu
2011 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing  
Mean time between critical failures The mean time between critical failures (MTBCF) of a system is the average time between critical failures of the system.  ...  The WSN can serve as an interface to the real world and fulfill the gap between real world and information systems.  ...  The FSMOS is separated into a number of logical modules each provides a set of APIs accessible for the user.  System services provide common functions for all layers, which are necessary for normal stack  ... 
doi:10.1109/wicom.2011.6040317 fatcat:b6qehpnmxjd35go7ycy5v5ru5y

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 SIGARCH Computer Architecture News  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  Virtual Machine Monitors for x86, such as VMware R Workstation and Virtual PC, have instead used binary translation of the guest kernel code.  ...  Special thanks to Jim Mattson for significant contributions to the hardware VMM. General thanks to the dozens of members of VMware's VMM group since 1998.  ... 
doi:10.1145/1168919.1168860 fatcat:3zfojsbisvaejmtuzgyxk6heei

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 ACM SIGOPS Operating Systems Review  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  Virtual Machine Monitors for x86, such as VMware R Workstation and Virtual PC, have instead used binary translation of the guest kernel code.  ...  Special thanks to Jim Mattson for significant contributions to the hardware VMM. General thanks to the dozens of members of VMware's VMM group since 1998.  ... 
doi:10.1145/1168917.1168860 fatcat:r4adwx7udrbo5f43d5qobvz4mm

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  Virtual Machine Monitors for x86, such as VMware R Workstation and Virtual PC, have instead used binary translation of the guest kernel code.  ...  Special thanks to Jim Mattson for significant contributions to the hardware VMM. General thanks to the dozens of members of VMware's VMM group since 1998.  ... 
doi:10.1145/1168857.1168860 dblp:conf/asplos/AdamsA06 fatcat:ehz2gj3ivzgfvprvnshck76sti

A comparison of software and hardware techniques for x86 virtualization

Keith Adams, Ole Agesen
2006 SIGPLAN notices  
Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization.  ...  Virtual Machine Monitors for x86, such as VMware R Workstation and Virtual PC, have instead used binary translation of the guest kernel code.  ...  Special thanks to Jim Mattson for significant contributions to the hardware VMM. General thanks to the dozens of members of VMware's VMM group since 1998.  ... 
doi:10.1145/1168918.1168860 fatcat:vaeyhd4ccvdkbhbq3ogjclown4

Evaluation and Validation [chapter]

Peter Marwedel
2021 Embedded Systems  
This is the purpose of validations and evaluations which must be performed during the design process.  ...  This chapter starts with a presentation of techniques for the evaluation of (partial) designs with respect to objectives.  ...  According to M c Gregor, "Bridging the credibility gap is not the only reason for a growing interest in emulation -the above definition of an emulation model remains valid when turned around -an emulation  ... 
doi:10.1007/978-3-030-60910-8_5 fatcat:2ig4kpnbdzbfla7r2p3favqjoy

A survey of evaluation platforms for ad hoc routing protocols: A resilience perspective

Jesús Friginal, David de Andrés, Juan-Carlos Ruiz, Miquel Martínez
2014 Computer Networks  
Acknowledgements This work is partially supported by the Spanish project ARENES (TIN2012-38308-C02-01), the ANR French project AMORES (ANR-11-INSE-010), and the Intel Doctoral Student Honour Programme  ...  The gap between simulated and experimental results may lead to differences between the behaviour of the simulated network and that of the real one.  ...  We claim that more platforms are necessary to cover the gap between the ad hoc networks we are able to design and implement, and the confident service they are able to deliver.  ... 
doi:10.1016/j.comnet.2014.09.010 fatcat:btliobjt2jcupe37k7wtrlgcqe

Zero-maintenance of electronic systems: Perspectives, challenges, and opportunities

Richard McWilliam, Samir Khan, Michael Farnsworth, Colin Bell
2018 Microelectronics and reliability  
Design techniques are critically reviewed to clarify the role of fault coverage, resource allocation and fault awareness, set in the context of existing and emerging printable/nanoscale manufacturing processes  ...  The analysis presents new opportunities to form a view on the research required for a successful integration of zero-maintenance. Finally, the potential cost benefits and future trends are enumerated.  ...  Fault events cause serious consequences for safety critical systems and often require costly fault-finding and maintenance.  ... 
doi:10.1016/j.microrel.2018.04.001 fatcat:bjr3ynhgs5eirdu3yitgnfh3mm

Design and Validation Process of In-Vehicle Embedded Electronic Systems [chapter]

YeQiong Song, Françoise Simonot-Lion
2005 Embedded Systems Handbook  
For example, we can cite brake-by-wire, steer-by-wire, that will be shortly integrated in cars for the implementation of critical and safety relevant functions.  ...  In order to ensure dependability and fault tolerance for critical applications, the time-triggered operating system OSEKtime [11] was proposed.  ... 
doi:10.1201/9781420038163.sec6 fatcat:tdr3aerzqbavxmmua7am4rhquq

Design and Validation Process of In-Vehicle Embedded Electronic Systems [chapter]

YeQiong Song, Françoise Simonot-Lion
2005 Embedded Systems Handbook  
For example, we can cite brake-by-wire, steer-by-wire, that will be shortly integrated in cars for the implementation of critical and safety relevant functions.  ...  In order to ensure dependability and fault tolerance for critical applications, the time-triggered operating system OSEKtime [11] was proposed.  ... 
doi:10.1201/9781420038163.ch41 fatcat:7gi2kppqrjaevja44tqqeahrra

New Fault Injection Approach for Network on Chip

Tapas Patel
2013 IOSR Journal of Electronics and Communication Engineering  
The developed environment allows to inject a faults into a NoC architecture by acting through the FPGA's configuration memory.  ...  The typical NoC design is based on the data exchange between the functional IP cores in the form of data packets.  ...  BW of MSA can also be increased by cutting a resonant slot inside the patch or by using multi resonator gap coupled and stacked configurations [2] .  ... 
doi:10.9790/2834-0520106 fatcat:snatuoexlzd7bedziejtum6npe

Optimization of AUTOSAR Communication Stack in the Context of Advanced Driver Assistance Systems

Răzvan Bogdan, Mihaela Crișan-Vida, Darius Barmayoun, Loredana Lavinia Staicu, Robert Valentin Puiu, Mădălina Lup, Marius Marcu
2021 Sensors  
New trends in the automotive industry such as autonomous driving and Car2X require a large amount of data to be exchanged between different devices.  ...  The radar sensor is accessed in a remote manner, and the experiments aimed at performance measurements revealed that our solution is superior to the Full AUTOSAR implementation in terms of memory usage  ...  Acknowledgments: This work was supported by a grant from the Romanian Ministry of Research, Innovation, and Digitization, project number POC/398/1-Development of networks of R&D centers,  ... 
doi:10.3390/s21134561 fatcat:ptxofujsxzaszpzfv3ulinorqu

Authenticated encryption for time-sensitive critical infrastructure

Daniel Hunter, Jack Parry, Kenneth Radke, Colin Fidge
2017 Proceedings of the Australasian Computer Science Week Multiconference on - ACSW '17  
Our results provide the first detailed analysis of the time taken to encrypt, transmit, and decrypt a critical infrastructure protocol using a stream cipher in a realistic physical environment.  ...  Furthermore, in safety-critical systems data confidentiality is not the only information security concern. Data integrity must be preserved as well.  ...  The authors wish to thank Mufeed ALMashrafi and Kenneth Wong for advice on stream ciphers.  ... 
doi:10.1145/3014812.3014832 dblp:conf/acsw/HunterPRF17 fatcat:xbh45pokxjhlfe72ziydlozvya
« Previous Showing results 1 — 15 out of 1,458 results