A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Retrospective: what have we learned from the PDP-11---what we have learned from VAX and Alpha
1998
25 years of the international symposia on Computer architecture (selected papers) - ISCA '98
VMS was a true 32-bit virtual memory operating system that performed well from its first release. ...
VAX and its closely related software system -VMS -became the defacto standard for 32-bit virtual memory networked computing in the 1980's. ...
doi:10.1145/285930.285934
dblp:conf/isca/BellS98
fatcat:ia264vxvfvhvjbjhxdvq2psx7q
Architecture- and OS-Independent Binary-Level Dynamic Test Generation
[chapter]
2009
Lecture Notes in Computer Science
We have implemented our ReT-BLDTG, retargeted it to 32-bit x86, PowerPC and Sparc ISAs, and used it to automatically find the six known bugs in the six benchmarks over Linux and Windows. ...
new program inputs from previous constraints in order to steer next executions towards new program paths. ...
the Linux and Windows the binaries for 32-bit x86, PowerPC and Sparc ISAs. ...
doi:10.1007/978-3-642-11145-7_16
fatcat:muzw73vqwzdpbjm7znguc4kxbq
Microscopy in the 64-bit age
2010
Microscopy and Microanalysis
In theory this limit can be raised in the future to 16 EB (2 64 bytes) but it already overcomes the constraints imposed by the current 32-bit architecture and 4GB address limit. ...
In the last few years 64-bit versions of the Windows OS have become available. ...
In theory this limit can be raised in the future to 16 EB (2 64 bytes) but it already overcomes the constraints imposed by the current 32-bit architecture and 4GB address limit. ...
doi:10.1017/s1431927610061155
fatcat:4wpppvwyffazlpvo5t5unmcubq
Page 11 of Hewlett-Packard Journal Vol. 36, Issue 10
[page]
1985
Hewlett-Packard Journal
In this mode, display reads are 32 bits wide, requiring a 32-bit shift register, but display update accesses are still 16 bits wide. ...
The GPU checks for overlapping windows in all window oper- ations and adjusts its window move algorithm to prevent losing data in the overlap area. Alpha Label Commands. ...
A Reconfigurable Viterbi Traceback for Implemenation on Turbo Decoding Array
2006
2006 IEEE International SOC Conference
The trace back operation as used in Viterbi decoding is presented. ...
The trace back is used for a new large constraint length, soft decision viterbi decoder designed to be implemented reusing components of turbo decoding array. ...
For example in equation ( 1 ), the size of the PH RAM for constraint length 9 (as in 3GPP) will be: Size of PH RAM =32x54x4 = 6912x8 bits. ...
doi:10.1109/socc.2006.283858
dblp:conf/socc/AhmedA06
fatcat:c643z2d3mjckzfg3xdxlmhgzx4
MEGA7: Molecular Evolutionary Genetics Analysis Version 7.0 for Bigger Datasets
2016
Molecular biology and evolution
The 64-bit MEGA is made available in two interfaces: graphical and command line. The graphical user interface (GUI) is a native Microsoft Windows application that can also be used on Mac OS X. ...
In this major upgrade, MEGA has been optimized for use on 64-bit computing systems for analyzing larger datasets. Researchers can now explore and analyze tens of thousands of sequences in MEGA. ...
We thank Julie Marin for help in assembling the rRNA data analyzed. ...
doi:10.1093/molbev/msw054
pmid:27004904
fatcat:7bsqead3n5he3gmbzkmfetdj3e
Locating ×86 paging structures in memory images
2010
Digital Investigation. The International Journal of Digital Forensics and Incident Response
In this paper, we describe an algorithm to locate paging structures in a memory image of an Â86 platform running either Linux or Windows XP. ...
Paging Virtualization a b s t r a c t Digital memory forensics consists of analyzing various components of a memory image from a compromised host. ...
Physical Address Extension (PAE) mode maps 32-bit virtual addresses to 36-bit physical addresses, enabling up to 2 36 bits (64 GB) of RAM. ...
doi:10.1016/j.diin.2010.08.002
fatcat:agecoj7rqjedziabnug3atusj4
Extending OpenVMS for 64-bit Addressable Virtual Memory
1996
Digital technical journal of Digital Equipment Corporation
The OpenVMS operating system recently extended its 32-bit virtual address space to exploit the Alpha processor's 64-bit virtual addressing capacity while ensuring binary compatibility for 32-bit nonprivileged ...
Extending the virtual address space is a fundamental evolutionary step for the OpenVMS operating system, which has existed within the bounds of a 32-bit address space for nearly 20 years. ...
Thanks also to members of the Alpha languages community who provided extended programming support for a 64-bit environment; to Wayne Cardoza, who helped shape the earliest notions of what could be accomplished ...
dblp:journals/dtj/HarveyS96
fatcat:m7cncjpdwvfzne6vpvfcqg6bku
Robust bootstrapping memory analysis against anti-forensics
2016
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Memory analysis is increasingly used to collect digital evidence in incident response. ...
Thus, collapse in any of the three steps using the suggested robust algorithms leads to failure in the memory analysis. ...
In the Windows 7 SP1 version, for example, the offset has a constant value of 38,784 in the 32-bit non-PAE, 38720 in the 32-bit PAE, and 57,280 in the 64 bit. ...
doi:10.1016/j.diin.2016.04.009
fatcat:x6zdtf7xene7xp27bhw4exay5q
the tag bits and perform virtual memory swapping. ...
Our emulated Minos systems running Linux and Windows have stopped ten actual attacks. ...
ACKNOWLEDGMENTS In addition to thanking everyone we acknowledged in the two conference papers [Crandall and Chong 2004b; Crandall et al. 2005b ], we would like to thank the DIMVA reviewers who we forgot ...
doi:10.1145/1187976.1187977
fatcat:xtosxrf7pfd3nmsakxdyprq7tm
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems
[article]
2020
arXiv
pre-print
Memory corruption vulnerabilities have been around for decades and rank among the most prevalent vulnerabilities in embedded systems. ...
Combined with the irregular and involved nature of embedded patch management, this results in prolonged vulnerability exposure windows and vulnerabilities that are relatively easy to exploit. ...
Consider, for example, ASLR and its dependency on virtual memory. Traditionally, the use of virtual memory in real-time operating systems has been avoided due to timing analysis complications [24] . ...
arXiv:2007.02307v1
fatcat:fmmoab4wcrgoblzrmvelac6cbm
The long road to 64 bits
2009
Communications of the ACM
Windows 16-bit applications still run on regular Windows XP, 20 years after the 80386 was introduced. Such support has finally been dropped in Windows XP x64. DEC. ...
For example, 32-bit systems easily have VLs of 4, 3.75, 3.5, or 2GB. A given program execution uses at most PM (program memory) bytes of virtual memory. ...
doi:10.1145/1435417.1435431
fatcat:dloa4m7rinbxjiuvmrfmvcnkwe
The long road to 64 bits
2006
Queue
Windows 16-bit applications still run on regular Windows XP 20 years after the 80386 was introduced. Such support has finally been dropped in Windows XP x64. DEC. ...
For example, 32-bit systems easily have VLs of 4, 3.75, 3.5, or 2 GB. A given program execution uses at most PM (program memory) bytes of virtual memory. ...
doi:10.1145/1165754.1165766
fatcat:htk7fzurpzd5rbqxjouqou4jca
Core Communication Interface for FPGAs
2004
Journal of Integrated Circuits and Systems
The approach targets system-on-a-chip designs build in a single FPGA device. The paper proposes a communication interface that allows IP cores replacement during the FPGA normal operation. ...
This tool permits to implement virtual hardware, in the same manner as virtual memory. The user may have several hard cores stored in memory. ...
This approach is similar to the "virtual memory" concept, found in traditional operating systems and could be named "virtual hardware" [4] . ...
doi:10.29292/jics.v1i1.254
fatcat:6epysizoajc5towoa5jvcwvyr4
A scalable architecture for ordered parallelism
2015
Proceedings of the 48th International Symposium on Microarchitecture - MICRO-48
In this architecture, programs consist of short tasks with programmer-specified timestamps. ...
Swarm builds on prior TLS and HTM schemes, and contributes several new techniques that allow it to scale to large core counts and speculation windows, including a new execution model, speculation-aware ...
As in LogTM [48] , the L3 directory uses memory-backed sticky bits to only check tiles whose tasks may have accessed the line. Sticky bits are managed exactly as in LogTM. ...
doi:10.1145/2830772.2830777
dblp:conf/micro/JeffreySYES15
fatcat:wb6pmhjefnccjdmjsw7oy2gxha
« Previous
Showing results 1 — 15 out of 29,148 results