Filters








29,148 Hits in 7.3 sec

Retrospective: what have we learned from the PDP-11---what we have learned from VAX and Alpha

Gorden Bell, W. D. Strecker
1998 25 years of the international symposia on Computer architecture (selected papers) - ISCA '98  
VMS was a true 32-bit virtual memory operating system that performed well from its first release.  ...  VAX and its closely related software system -VMS -became the defacto standard for 32-bit virtual memory networked computing in the 1980's.  ... 
doi:10.1145/285930.285934 dblp:conf/isca/BellS98 fatcat:ia264vxvfvhvjbjhxdvq2psx7q

Architecture- and OS-Independent Binary-Level Dynamic Test Generation [chapter]

Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang
2009 Lecture Notes in Computer Science  
We have implemented our ReT-BLDTG, retargeted it to 32-bit x86, PowerPC and Sparc ISAs, and used it to automatically find the six known bugs in the six benchmarks over Linux and Windows.  ...  new program inputs from previous constraints in order to steer next executions towards new program paths.  ...  the Linux and Windows the binaries for 32-bit x86, PowerPC and Sparc ISAs.  ... 
doi:10.1007/978-3-642-11145-7_16 fatcat:muzw73vqwzdpbjm7znguc4kxbq

Microscopy in the 64-bit age

J Wilbrink, R Harmon
2010 Microscopy and Microanalysis  
In theory this limit can be raised in the future to 16 EB (2 64 bytes) but it already overcomes the constraints imposed by the current 32-bit architecture and 4GB address limit.  ...  In the last few years 64-bit versions of the Windows OS have become available.  ...  In theory this limit can be raised in the future to 16 EB (2 64 bytes) but it already overcomes the constraints imposed by the current 32-bit architecture and 4GB address limit.  ... 
doi:10.1017/s1431927610061155 fatcat:4wpppvwyffazlpvo5t5unmcubq

Page 11 of Hewlett-Packard Journal Vol. 36, Issue 10 [page]

1985 Hewlett-Packard Journal  
In this mode, display reads are 32 bits wide, requiring a 32-bit shift register, but display update accesses are still 16 bits wide.  ...  The GPU checks for overlapping windows in all window oper- ations and adjusts its window move algorithm to prevent losing data in the overlap area. Alpha Label Commands.  ... 

A Reconfigurable Viterbi Traceback for Implemenation on Turbo Decoding Array

Imran Ahmed, Tughrul Arslan
2006 2006 IEEE International SOC Conference  
The trace back operation as used in Viterbi decoding is presented.  ...  The trace back is used for a new large constraint length, soft decision viterbi decoder designed to be implemented reusing components of turbo decoding array.  ...  For example in equation ( 1 ), the size of the PH RAM for constraint length 9 (as in 3GPP) will be: Size of PH RAM =32x54x4 = 6912x8 bits.  ... 
doi:10.1109/socc.2006.283858 dblp:conf/socc/AhmedA06 fatcat:c643z2d3mjckzfg3xdxlmhgzx4

MEGA7: Molecular Evolutionary Genetics Analysis Version 7.0 for Bigger Datasets

Sudhir Kumar, Glen Stecher, Koichiro Tamura
2016 Molecular biology and evolution  
The 64-bit MEGA is made available in two interfaces: graphical and command line. The graphical user interface (GUI) is a native Microsoft Windows application that can also be used on Mac OS X.  ...  In this major upgrade, MEGA has been optimized for use on 64-bit computing systems for analyzing larger datasets. Researchers can now explore and analyze tens of thousands of sequences in MEGA.  ...  We thank Julie Marin for help in assembling the rRNA data analyzed.  ... 
doi:10.1093/molbev/msw054 pmid:27004904 fatcat:7bsqead3n5he3gmbzkmfetdj3e

Locating ×86 paging structures in memory images

Karla Saur, Julian B. Grizzard
2010 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
In this paper, we describe an algorithm to locate paging structures in a memory image of an Â86 platform running either Linux or Windows XP.  ...  Paging Virtualization a b s t r a c t Digital memory forensics consists of analyzing various components of a memory image from a compromised host.  ...  Physical Address Extension (PAE) mode maps 32-bit virtual addresses to 36-bit physical addresses, enabling up to 2 36 bits (64 GB) of RAM.  ... 
doi:10.1016/j.diin.2010.08.002 fatcat:agecoj7rqjedziabnug3atusj4

Extending OpenVMS for 64-bit Addressable Virtual Memory

Michael S. Harvey, Leonard S. Szubowicz
1996 Digital technical journal of Digital Equipment Corporation  
The OpenVMS operating system recently extended its 32-bit virtual address space to exploit the Alpha processor's 64-bit virtual addressing capacity while ensuring binary compatibility for 32-bit nonprivileged  ...  Extending the virtual address space is a fundamental evolutionary step for the OpenVMS operating system, which has existed within the bounds of a 32-bit address space for nearly 20 years.  ...  Thanks also to members of the Alpha languages community who provided extended programming support for a 64-bit environment; to Wayne Cardoza, who helped shape the earliest notions of what could be accomplished  ... 
dblp:journals/dtj/HarveyS96 fatcat:m7cncjpdwvfzne6vpvfcqg6bku

Robust bootstrapping memory analysis against anti-forensics

Kyoungho Lee, Hyunuk Hwang, Kibom Kim, BongNam Noh
2016 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Memory analysis is increasingly used to collect digital evidence in incident response.  ...  Thus, collapse in any of the three steps using the suggested robust algorithms leads to failure in the memory analysis.  ...  In the Windows 7 SP1 version, for example, the offset has a constant value of 38,784 in the 32-bit non-PAE, 38720 in the 32-bit PAE, and 57,280 in the 64 bit.  ... 
doi:10.1016/j.diin.2016.04.009 fatcat:x6zdtf7xene7xp27bhw4exay5q

Minos

Jedidiah R. Crandall, S. Felix Wu, Frederic T. Chong
2006 ACM Transactions on Architecture and Code Optimization (TACO)  
the tag bits and perform virtual memory swapping.  ...  Our emulated Minos systems running Linux and Windows have stopped ten actual attacks.  ...  ACKNOWLEDGMENTS In addition to thanking everyone we acknowledged in the two conference papers [Crandall and Chong 2004b; Crandall et al. 2005b ], we would like to thank the DIMVA reviewers who we forgot  ... 
doi:10.1145/1187976.1187977 fatcat:xtosxrf7pfd3nmsakxdyprq7tm

Challenges in Designing Exploit Mitigations for Deeply Embedded Systems [article]

Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle
2020 arXiv   pre-print
Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems.  ...  Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit.  ...  Consider, for example, ASLR and its dependency on virtual memory. Traditionally, the use of virtual memory in real-time operating systems has been avoided due to timing analysis complications [24] .  ... 
arXiv:2007.02307v1 fatcat:fmmoab4wcrgoblzrmvelac6cbm

The long road to 64 bits

John Mashey
2009 Communications of the ACM  
Windows 16-bit applications still run on regular Windows XP, 20 years after the 80386 was introduced. Such support has finally been dropped in Windows XP x64. DEC.  ...  For example, 32-bit systems easily have VLs of 4, 3.75, 3.5, or 2GB. A given program execution uses at most PM (program memory) bytes of virtual memory.  ... 
doi:10.1145/1435417.1435431 fatcat:dloa4m7rinbxjiuvmrfmvcnkwe

The long road to 64 bits

John R. Mashey
2006 Queue  
Windows 16-bit applications still run on regular Windows XP 20 years after the 80386 was introduced. Such support has finally been dropped in Windows XP x64. DEC.  ...  For example, 32-bit systems easily have VLs of 4, 3.75, 3.5, or 2 GB. A given program execution uses at most PM (program memory) bytes of virtual memory.  ... 
doi:10.1145/1165754.1165766 fatcat:htk7fzurpzd5rbqxjouqou4jca

Core Communication Interface for FPGAs

José Carlos Palma, Aline Vieira De Mello, Leandro Möller, Fernando Moraes, Ney Calazans
2004 Journal of Integrated Circuits and Systems  
The approach targets system-on-a-chip designs build in a single FPGA device. The paper proposes a communication interface that allows IP cores replacement during the FPGA normal operation.  ...  This tool permits to implement virtual hardware, in the same manner as virtual memory. The user may have several hard cores stored in memory.  ...  This approach is similar to the "virtual memory" concept, found in traditional operating systems and could be named "virtual hardware" [4] .  ... 
doi:10.29292/jics.v1i1.254 fatcat:6epysizoajc5towoa5jvcwvyr4

A scalable architecture for ordered parallelism

Mark C. Jeffrey, Suvinay Subramanian, Cong Yan, Joel Emer, Daniel Sanchez
2015 Proceedings of the 48th International Symposium on Microarchitecture - MICRO-48  
In this architecture, programs consist of short tasks with programmer-specified timestamps.  ...  Swarm builds on prior TLS and HTM schemes, and contributes several new techniques that allow it to scale to large core counts and speculation windows, including a new execution model, speculation-aware  ...  As in LogTM [48] , the L3 directory uses memory-backed sticky bits to only check tiles whose tasks may have accessed the line. Sticky bits are managed exactly as in LogTM.  ... 
doi:10.1145/2830772.2830777 dblp:conf/micro/JeffreySYES15 fatcat:wb6pmhjefnccjdmjsw7oy2gxha
« Previous Showing results 1 — 15 out of 29,148 results