The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Heterogeneous memory management combined with server virtualization in datacenters is expected to increase the software and OS management complexity. State-of-the-art solutions rely exclusively on the hypervisor (VMM) for expensive page hotness tracking and migrations, limiting the benefits from heterogeneity. To address this, we design HeteroOS, a novel application-transparent OS-level solution for...
Recent advances in hardware and software of cloud computing are putting tremendous pressure on the administrators who manage these resources to provide uninterrupted services. Monitoring cloud computing plays a significant role in enhancing the quality of cloud computing services. Regular monitoring may help to adaptively scale resource utilization and determine service problems. It also helps to...
Operating Systems (OSs) have an important position in the Computer Science curriculum. When students face this subject, they study core concepts, mechanisms and strategies that apply to several fields. To support practical lectures in an OSs course, instructors may adopt an OS on which students can work, exercising their knowledge and enhancing their practical skills. In this context, we present Nanvix,...
Virtualization is the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments. The applications of virtualization are spreading rapidly and the critical systems are working on virtualization infrastructures. However; the effects of security vulnerabilities which may occur can also be high. In this study, security...
ICT systems have become an integral part of business and life. At the same time, these systems have become extremely complex. In such systems exist numerous vulnerabilities waiting to be exploited by potential threat actors. pwnPr3d is a novel modelling approach that performs automated architectural analysis with the objective of measuring the cyber security of the modeled architecture. Its integrated...
This paper presents a solution for establishing communication with Icecast and Shoutcast audio broadcasting servers. Web radio station is implemented, which means that is possible to broadcast an audio content from the local computer through Shoutcast and Icecast servers. Also, audio player is implemented for both local files, as well as web radio using FFmpeg libraries for audio package manipulation...
Fault injection testing approaches assess the reliability of execution environments for critical software. They support the early testing of safety concepts that mitigate the impact of hardware failures on software behavior. The growing use of platform software for embedded systems raises the need to verify safety concepts that execute on top of operating systems and middleware platforms. Current...
Modern operating systems (OSs) consist of numerous interacting components, many of which are developed and maintained independently of one another. In monolithic systems, the boundaries of and interfaces between such components are not strictly enforced at runtime. Therefore, faults in individual components may directly affect other parts of the system in various ways. Software fault injection (SFI)...
In the last years an increasing number of attacks targeting energy consumption in computing systems have been designed and deployed. In this paper we propose a methodology that can be used to limit the effect of all types of power attacks by using the isolation properties guaranteed by virtualization systems. We describe the idea underlying our approach and we present the power consumption measurements...
The increasing memory requirements of big data applications have been driving the precipitous growth of memory capacity in server systems. To maximize the efficiency of external memory, HW-based memory compression techniques have been proposed to increase effective memory capacity. Although such memory compression techniques can improve the memory efficiency significantly, a critical trade-off exists...
Updates to a process's page table entry (PTE) renders any existing copies of that PTE in any of a system's TLBs stale. To prevent a process from making illegal memory accesses using stale TLB entries, the operating system (OS) performs a costly TLB shootdown operation. Rather than explicitly issuing shootdowns, we propose a coordinated TLB and page table management mechanism where an expirationtime...
Dynamic Binary Translation is one of the most efficient strategies for the simulation of System-on-Chips, with recent studies showing that a large part of the simulation time is spent in realizing memory accesses. Indeed, the simulation of each load and store instructions requires a software emulation of the hardware Memory Management Unit (MMU). In this work, we propose to realize memory accesses...
Temporal predictability is a crucial requirement for hard real-time applications. Thus, deterministic software execution flows are commonly aspired to achieve that requirement. However, as an apparently unavoidable contradiction to this approach in today's embedded systems, both IRQs and concurrently running tasks are also required to react to dynamic environments and to allow the modular composition...
This paper firstly describes the development and evaluation of a project course which yields university students building a complete hardware and software chain for a digital image processing application. To arouse the interest and learning initiative of students, we propose them to build a setup including a Raspberry Pi® and image processing programmes. This inexpensive single board computer answers...
Computer Science and Technology is a creative major with strong engineering. We should pay equal attention to the engineering practice teaching as well as theoretical teaching. In this paper, we introduced “multiple coupling and through type” teaching mode reform of computer major oriented by engineering ability training in Tongji University. Through the implementation of our proposed teaching mode,...
The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device independent and reliable. Cloud computing is built on the virtualization concept. Virtualization separates hardware from software and has benefits of server consolidation...
In order to prevent users from fake, this paper establishes a highly secure mobile terminal architecture based on ARM TrustZone, and analyzes the communication and memory sharing between trusted execution environment and common execution environment. The trust model of user operation is established, then propose a self _destruction mechanism of mobile equipment based on chip materials to detect fraudulent...
A dynamic positioning controller based on the digital signal processor (DSP) is designed for certain crane vessel on the basis of the SRI-VC2110DP dynamic positioning system developed by Shanghai Ship and Shipping Research Institute. Based on the actual needs for the dynamic positioning controller, the hardware circuit consisting of dual CAN bus interface, dual Ethernet interface and I/O interface...
Based on actual requirements and safety reliability requirements, this paper presents a design scheme of safety portable voice information recording equipment. There are two main parts in the whole system, one is the voice recording board and the other one is the portable military laptop. The voice recording board uses advanced RISC machines chip as the main chip equipped with real-time operating...
Many multicore and manycore architectures support hardware cache coherence. However, most of them rely on software techniques to maintain Translation Lookaside Buffer (TLB) coherence, namely the TLB shootdown routine, which is a costly procedure, known to be hardly scalable.The TSAR architecture is a manycore architecture including hardware TLB coherence, but in which the TLB coherence mechanism is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.