• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 913
Next 10 →

Efficient Software-Based Fault Isolation

by Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham , 1993
"... One way to provide fault isolation among cooperating software modules is to place each in its own address space. However, for tightly-coupled modules, this solution incurs prohibitive context switch overhead, In this paper, we present a software approach to implementing fault isolation within a sing ..."
Abstract - Cited by 777 (12 self) - Add to MetaCart
One way to provide fault isolation among cooperating software modules is to place each in its own address space. However, for tightly-coupled modules, this solution incurs prohibitive context switch overhead, In this paper, we present a software approach to implementing fault isolation within a

Memory resource management in VMware ESX server,”

by Carl A Waldspurger - In Proc. of the 5th OSDI, , 2002
"... Abstract VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims ..."
Abstract - Cited by 449 (2 self) - Add to MetaCart
reclaims the pages considered least valuable by the operating system running in a virtual machine. An idle memory tax achieves efficient memory utilization while maintaining performance isolation guarantees. Content-based page sharing and hot I/O page remapping exploit transparent page remapping

Architectural support for software-based protection

by Mihai Budiu, Úlfar Erlingsson, Martín Abadi - In Workshop on Architectural and System Support for Improving Software Dependability (ASID , 2006
"... Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data memory. We have shown in prior work how CFI can be enforced by using inlined software guards that perform safety checks. Th ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
for critical system state. XFI can be seen as a flexible, generalized form of software-based fault isolation (SFI). In the second part of this paper we present ISA support for XFI, in the form of simple bounds-check instructions. CFI and XFI can significantly increase the security and integrity of software

ABSTRACT Harbor: Software-based Memory Protection For Sensor Nodes

by unknown authors
"... Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no form of hardware memory protection. Programming errors in one application can easily corrupt the state of the operating ..."
Abstract - Add to MetaCart
system or other applications. In this paper, we propose Harbor, a memory protection system that prevents many forms of memory corruption. We use software based fault isolation (“sandboxing”) to restrict application memory accesses and control flow to protection domains within the address space. A

Software-Based Self-Testing of Embedded Processors

by Nektarios Kranitis, Student Member, Antonis Paschalis, Dimitris Gizopoulos, Senior Member, George Xenoulis - IEEE Transactions on Computers , 2005
"... Abstract—Embedded processor testing techniques based on the execution of self-test programs have been recently proposed as an effective alternative to classic external tester-based testing and pure hardware built-in self-test (BIST) approaches. Software-based self-testing is a nonintrusive testing a ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
approach and provides at-speed testing capability without any hardware or performance overheads. In this paper, we first present a high-level, functional component-oriented, software-based self-testing methodology for embedded processors. The proposed methodology aims at high structural fault coverage

Towards Energy-Aware Software-Based Fault Tolerance in Real-Time Systems ∗

by unknown authors
"... Many real-time systems employed in defense, space, and consumer applications have power constraints and high reliability requirements. In this paper, we focus on the relationship between fault tolerance techniques and energy consumption. In particular, we establish the energy efficiency of Applicati ..."
Abstract - Add to MetaCart
of Application Level Fault Tolerance (ALFT) over other software-based fault tolerance methods. We then develop sensible energyaware heuristics for ALFT schemes. The heuristics yield up to 40 % energy savings.

Software-Based Self-Test Methodology for Crosstalk Faults in Processors *

by unknown authors
"... Due to signal integrity problem’s inherent sensitivity to timing, power supply voltage and temperature, it is desirable to test AC failures such as crosstalk-induced errors at operational speed and in the circuit’s natural operational environment. To overcome the daunting cost and increasing perform ..."
Abstract - Add to MetaCart
performance hindrance of high-speed external testers, Software-Based Self-Test (SBST) is proposed as a high-quality low-cost at-speed testing solution for AC failures in programmable processors and System-on-Chips (SoC). SBST utilizes low-cost testers, applies tests and captures test responses in the natural

Software-based testing of sequential VHDL descriptions

by M. Scholivé, V. Beroulle, C. Robach, M. L. Flottes, B. Rouzeyre - in IEEE European Test Workshop , 2003
"... In this paper, we propose a new high-level test pattern generation technique for sequential circuits. The main motivation is two-fold: on one hand, we elaborate test data for design validation; on the other hand, we deal with the problem of structural test development at functional level. The propos ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. The proposed test method, i.e. mutation testing, allows us to work with a fault model at software level on VHDL descriptions; this approach has already shown its efficiency on combinational descriptions. In order to tackle the specific problem of sequential circuits, the description is modified so

BCube: A High Performance, Server-centric Network Architecture for Modular Data Centers

by Chuanxiong Guo, Guohan Lu, Dan Li, Haitao Wu, Xuan Zhang, Yunfeng Shi, Chen Tian, Yongguang Zhang, Songwu Lu - In SIGCOMM , 2009
"... This paper presents BCube, a new network architecture specifically designed for shipping-container based, modular data centers. At the core of the BCube architecture is its server-centric network structure, where servers with multiple network ports connect to multiple layers of COTS (commodity off-t ..."
Abstract - Cited by 248 (31 self) - Add to MetaCart
show that BCube can be seamlessly integrated with the TCP/IP protocol stack and BCube packet forwarding can be efficiently implemented in both hardware and software. Experiments in our testbed demonstrate that BCube is fault tolerant and load balancing and it significantly accelerates representative

Software Canaries: Software-based Path Delay Fault Testing for Variation-aware Energy-efficient Design

by John Sartori , Rakesh Kumar
"... ABSTRACT Software-based path delay fault testing (SPDFT) has been used to identify faulty chips that cannot meet timing constraints due to gross delay defects. In this paper, we propose using SPDFT for a new purpose -aggressively selecting the operating point of a variation-affected design. In orde ..."
Abstract - Add to MetaCart
ABSTRACT Software-based path delay fault testing (SPDFT) has been used to identify faulty chips that cannot meet timing constraints due to gross delay defects. In this paper, we propose using SPDFT for a new purpose -aggressively selecting the operating point of a variation-affected design
Next 10 →
Results 1 - 10 of 913
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University