Optimizing peer relationships in a super-peer network

P Garbacki, DHJ Epema… - … on Distributed Computing …, 2007 - ieeexplore.ieee.org
Super-peer architectures exploit the heterogeneity of nodes in a P2P network by assigning
additional responsi-bilities to higher-capacity nodes. In the design of a super-peer network …

Comparison and evaluation of routing protocols based on a collaborative simulation using SUMO and NS3 with TraCI

Y Yang, SY Hao, HB Cai - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Vehicle Ad hoc Network (VANET) is an emerging technology and a new application of
mobile Ad Hoc technology in the field of traffic. As the simulation experiments cost less …

[PDF][PDF] Formally verified isolation of dma

J Haglund, R Guanciale - 22nd Conference on Formal Methods in …, 2022 - library.oapen.org
Every computer having a network, USB or disk controller has a Direct Memory Access
Controller (DMAC) which is configured by a driver to transfer data between the device and …

Automatic generation of high-coverage tests for RTL designs using software techniques and tools

Y Zhang, W Feng, M Huang - 2016 IEEE 11th Conference on …, 2016 - ieeexplore.ieee.org
Register Transfer Level (RTL) design validation is a crucial stage in the hardware design
process. We present a new approach to enhancing RTL design validation using available …

Regression testing of virtual prototypes using symbolic execution

B Lin, D Qian - arXiv preprint arXiv:1601.05850, 2016 - arxiv.org
Recently virtual platforms and virtual prototyping techniques have been widely applied for
accelerating software development in electronics companies. It has been proved that these …

Post-silicon functional validation with virtual prototypes

K Cong - 2015 - search.proquest.com
Post-silicon validation has become a critical stage in the system-on-chip (SoC) development
cycle, driven by increasing design complexity, higher level of integration and decreasing …

Formal Verification of Peripheral Memory Isolation

J Haglund - 2023 - diva-portal.org
In many contexts, computers run both critical and untrusted software, necessitating the need
for isolating critical software from untrusted software. These computers contain CPUs …

A Design of Direct Memory Access Controller for Wireless Communication SoC in Power Grid

Y Chi, Z Zheng - 2018 IEEE 2nd International Conference on …, 2018 - ieeexplore.ieee.org
This paper presents a complete Register Transfer Level (RTL) design of Direct Memory
Access (DMA) controller which is compliable with the Advanced Highperformance Bus …

Verifying Absence of Hardware-Software Data Races using Counting Abstraction

T Yavuz - 2020 18th ACM-IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Device drivers are critical components of operating systems. However, due to their
interactions with the hardware and being embedded in complex programming models …

[PDF][PDF] Asurvey of virtual prototyping techniques for system development and validation

S Mu, G Pan, Z Tian, J Feng - International Journal of Computer …, 2015 - academia.edu
Recently, different kinds of computer systems like smart phones, embedded systems and
cloud servers, are more and more widely used and the system development and validation …