Filters








17,639 Hits in 5.0 sec

Optimizing Control Transfer and Memory Virtualization in Full System Emulators

Ding-Yong Hong, Chun-Chen Hsu, Cheng-Yi Chou, Wei-Chung Hsu, Pangfeng Liu, Jan-Jan Wu
2015 ACM Transactions on Architecture and Code Optimization (TACO)  
First, we optimize performance by enabling classic control transfer optimizations of dynamic binary translation in full system emulation, such as indirect branch target caching and block chaining.  ...  Full system emulators usually use dynamic binary translation to obtain reasonable performance. This paper focuses on optimizing the performance of full system emulators.  ...  We expect more improvement from other dynamic binary optimizations, such as trace optimizations in system-level emulations. REFERENCES  ... 
doi:10.1145/2837027 fatcat:gyl747zknrhqbjudlmqpv7rdoq

ESL design and HW/SW co-verification of high-end software defined radio platforms

A. C. H. Ng, J. W. Weijers, M. Glassee, T. Schuster, B. Bougard, L. Van der Perre
2007 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis - CODES+ISSS '07  
SDR design faces hard real-time processing and data transfer latency constraints.  ...  Incremental RTL verification based on co-simulation and co-emulation is also presented.  ...  Direct memory access controllers (DMACs) are used for data transfers.  ... 
doi:10.1145/1289816.1289864 dblp:conf/codes/NgWGSBP07 fatcat:i76lkw33anhcllhiq3vtlb2z3y

A software/hardware platform for rapid prototyping of video and multimedia designs

P. Schumacher, M. Mattavelli, A. Chirila-Rus, R. Turney
2005 Fifth International Workshop on System-on-Chip for Real-Time Applications (IWSOC'05)  
Traditional design and test of complex multimedia systems involves a large number of test vectors and is a difficult and time-consuming task.  ...  A rapid prototyping platform is thus created, and its use with complex video and multimedia systems is described.  ...  This paper describes such a virtual socket platform to enable rapid emulation of video and multimedia designs and verify various IP targeted for such systems.  ... 
doi:10.1109/iwsoc.2005.27 dblp:conf/iwsoc/SchumacherMCT05 fatcat:ypvg3w4ipnab7pcjgaagpsrjva

Runtime Performance Evaluation and Optimization of Type-2 Hypervisor for MIPS64 Architecture

Qurrat Ain, Muhammad Amir Mehmood
2019 Journal of King Saud University: Computer and Information Sciences  
This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article.  ...  This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version  ...  While in system call latency QEMU is better by 1.12 -3.54 times. In the future, interrupt, and memory management unit can be exploited for optimization.  ... 
doi:10.1016/j.jksuci.2019.11.006 fatcat:gvqpidjbard27f5cyjbxesaqxm

Practical taint-based protection using demand emulation

Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand
2006 ACM SIGOPS Operating Systems Review  
ability to dynamically switch a running system between virtualized and emulated execution.  ...  Unlike past approaches to taint tracking, which track tainted data by running the system completely in an emulator or simulator, resulting in considerable execution overhead, our work demonstrates the  ...  The authors would also like to thank our shepherd Gilles Muller, and Fabrice Bellard for his excellent work in creating a versatile open-source emulator that proved both enjoyable and educational to extend  ... 
doi:10.1145/1218063.1217939 fatcat:hiwss3754bcorm7xdowv6hfoqu

Practical taint-based protection using demand emulation

Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand
2006 Proceedings of the 2006 EuroSys conference on - EuroSys '06  
ability to dynamically switch a running system between virtualized and emulated execution.  ...  Unlike past approaches to taint tracking, which track tainted data by running the system completely in an emulator or simulator, resulting in considerable execution overhead, our work demonstrates the  ...  The authors would also like to thank our shepherd Gilles Muller, and Fabrice Bellard for his excellent work in creating a versatile open-source emulator that proved both enjoyable and educational to extend  ... 
doi:10.1145/1217935.1217939 dblp:conf/eurosys/HoFCWH06 fatcat:5qzr6jzyirh3vd6h44skc6ju74

In-Kernel Memory-Mapped I/O Device Emulation
Эмуляция ввода-вывода оборудования с отображением в ОЗУ внутри ядер операционных систем

V.Yu. Cheptsov, A.V. Khoroshilov
2018 Proceedings of the Institute for System Programming of RAS  
A well-known approach used in various virtual machine software is to put the entire operating system under a hypervisor and build the emulator externally.  ...  To illustrate the specifics and show potential issues we provide the ways to simplify the implementation and optimize it in speed depending on the target capabilities, the protocol emulated, and the project  ...  Acknowledgements The authors thank ISP RAS and SYRCoSE staff for review and comment, Nikita Golovliov for aid in SMC emulator development, and Marvin Häuser for reverseengineering Apple SMC UEFI drivers  ... 
doi:10.15514/ispras-2018-30(3)-9 fatcat:baui2zbefbew5getcvny7ullxi

Hardware-Accelerated Cross-Architecture Full-System Virtualization

Tom Spink, Harry Wagstaff, Björn Franke
2016 ACM Transactions on Architecture and Code Optimization (TACO)  
of full-system cross-platform virtualization.  ...  the virtual machine can improve CPU virtualization performance, (3) memory mapped guest I/O can be efficiently translated to fast I/O specific calls to emulated devices, and (4) the cost for asynchronous  ...  The native VM is then started, and control is transferred to the execution engine running inside.  ... 
doi:10.1145/2996798 fatcat:kefw3xgczzf7va3kw6opeaatim

DECAF++: Elastic Whole-System Dynamic Taint Analysis

Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin
2019 International Symposium on Recent Advances in Intrusion Detection  
In this paper, we propose an elastic wholesystem dynamic taint analysis approach, and implement it in a prototype called DECAF++.  ...  The main barrier of applying whole-system dynamic taint analysis in practice is the large slowdown that can be sometimes up to 30 times.  ...  Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
dblp:conf/raid/DavanianQQY19 fatcat:5jtyedcge5hzxnntefscfc25xu

Improving Virtualized Windows Network Performance by Delegating Network Processing

Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori
2009 2009 Eighth IEEE International Symposium on Network Computing and Applications  
Full virtualization (FV) allows unmodified guest OSes to run on virtualization-aware microprocessors. However, the significant overhead of device emulation in FV has caused high I/O overhead.  ...  Virtualized environments are important building blocks in consolidated data centers and cloud computing.  ...  Full virtualization (FV) has the advantage of compatibility with production operating system (OS) code, but the typical implementation methods (e.g., emulated devices) of FV suffer from significant emulation  ... 
doi:10.1109/nca.2009.49 dblp:conf/nca/KohPSESN09 fatcat:uavlzk6careo3kv2tbvpjx55oq

SPADnet network modeling, simulation and emulation

Chockalingam Veerappan, Esteban Venialgo, Claudio Bruschini, Edoardo Charbon
2014 2014 19th IEEE-NPSS Real Time Conference  
Two simulators, namely a coincidence network simulator and a data transfer simulator, designed to simulate two network channels, were optimized for speed and memory.  ...  Furthermore, these simulators were coupled with GATE in order to emulate a real PET system network.  ...  To optimize the simulator's performance, the node's buffer occupancy was modeled using its rate-of-change, and the simulation was run only when the status of a node's buffer changes either to/from full  ... 
doi:10.1109/rtc.2014.7097553 fatcat:7w6zegfz55gcxlkla535mgh64m

MDev-NVMe: A NVMe Storage Virtualization Solution with Mediated Pass-Through

Bo Peng, Haozhong Zhang, Jianguo Yao, Yaozu Dong, Yu Xu, Haibing Guan
2018 USENIX Annual Technical Conference  
This paper introduces MDev-NVMe, a new virtualization implementation for NVMe storage device with: (1) full NVMe storage virtualization running native NVMe driver in guest, and (2) a mediated pass-through  ...  The fast access to data and high parallel processing in high-performance computing instigates an urgent demand on the I/O improvement of the NVMe storage within datacenters.  ...  Each virtual machine is allocated with 4 VCPUs and 8GB system memory.  ... 
dblp:conf/usenix/PengZYDXG18 fatcat:gvdrgf2nyjcpfoawivaneux6gu

PinOS

Prashanth P. Bungale, Chi-Keung Luk
2007 Proceedings of the 3rd international conference on Virtual execution environments - VEE '07  
It achieves this by interposing between the subject system and hardware using virtualization techniques.  ...  As of today, PinOS can boot Linux on IA-32 in uniprocessor mode, and can instrument complex applications such as database and web servers.  ...  Thanks to Greg Lueck for many helpful discussions, especially about signals, and for fixing related bugs in Pin. Thanks to Robert Cohn and Vijay Janapareddi for helpful discussions. We thank Prof.  ... 
doi:10.1145/1254810.1254830 dblp:conf/vee/BungaleL07 fatcat:7axkbz77ivaq5dotob2xmatjhm

Internet-in-a-Box

Jonathan D. Ellithorpe, Zhangxi Tan, Randy H. Katz
2009 Proceedings of the 46th Annual Design Automation Conference on ZZZ - DAC '09  
Since models in our system are implemented in programmable hardware, designers have full control over emulated buffer sizes, line rates, topologies, and many other network properties.  ...  Full system control also gives researchers a significant degree of system visibility.  ...  The packet payload is stored in memory, and can be looked up using the TAG field by any component in the system (e.g., by the receiving node model to transfer the full packet into his address space).  ... 
doi:10.1145/1629911.1630137 dblp:conf/dac/EllithorpeTK09 fatcat:5cyjge3yijdepd74qbuyhwh52i

MaxHadoop: An Efficient Scalable Emulation Tool to Test SDN Protocols in Emulated Hadoop Environments

Claudio Calcaterra, Alessio Carmenini, Andrea Marotta, Ubaldo Bucci, Dajana Cassioli
2020 Journal of Network and Systems Management  
This paper presents MaxHadoop, a flexible and scalable emulation tool, which allows the efficient and accurate emulation of Hadoop environments over Software Defined Networks (SDNs).  ...  We validate the MaxHadoop emulator by executing two benchmarks, namely WordCount and TeraSort, to evaluate a set of Key Performance Indicators.  ...  Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long  ... 
doi:10.1007/s10922-020-09552-x fatcat:fha2oi5u2vhf5j424znp64zfbq
« Previous Showing results 1 — 15 out of 17,639 results