نتایج جستجو برای: embedded memory

تعداد نتایج: 361352  

2013
Sohee Jeon Jun Young Jang Jae Ryoun Youn Jun-ho Jeong Howard Brenner Young Seok Song

Securing fragile nanostructures against external impact is indispensable for offering sufficiently long lifetime in service to nanoengineering products, especially when coming in contact with other substances. Indeed, this problem still remains a challenging task, which may be resolved with the help of smart materials such as shape memory and self-healing materials. Here, we demonstrate a shape...

Journal: :Trans. HiPEAC 2007
Vijay Nagarajan Rajiv Gupta Arvind Krishnaswamy

A critical component in the design of secure processors is memory encryption which provides protection for the privacy of code and data stored in off-chip memory. The overhead of the decryption operation that must precede a load requiring an off-chip memory access, decryption being on the critical path, can significantly degrade performance. Recently hardware counterbased one-time pad encryptio...

1997
Khawar M. Zuberi

In object-oriented programming, updates to the state variables of objects (by the methods of the object) have to be protected through semaphores to ensure mutual exclusion. Semaphore operations are invoked each time an object is accessed, and this represents signiicant run-time overhead. This is of special concern in cost-conscious, small-size embedded systems | such as those used in automotive...

2002
Bruce F. Cockburn

At present, system-on-a-chip (SoC) designers are confronted with a variety of alternative embedded memory technologies including SRAM, DRAM, and flash memory. Each of these memory options has both strengths and weaknesses. SRAM offers compatibility with logic and fast read and write speeds at the cost of large 4or 6-transistor storage cells and relatively high dynamic power consumption. DRAM of...

Journal: :CoRR 2016
Peter Henderson Muthucumaru Maheswaran

Embedded systems permeate through nearly all aspects of modern society. From cars to refrigerators to nuclear refineries, securing these systems has never been more important. Intrusions, such as the Stuxnet malware which broke the centrifuges in Iran’s Natanz refinery, can be catastrophic to not only the infected systems, but even to the wellbeing of the surrounding population. Modern day prot...

2015

marxism after marx pdf class="text">Has led to the development of a number of debugging tools to detect unreachable memory. Create a book Download as PDF Printable version.Memory leak detection using Electric fence and Valgrind. An operating system that does not release the memory consumed by the application when the.Memory leak is a major resource issue which could lead to many system. 2 Cal E...

2005
Ke Ning David R. Kaeli

Power efficiency has become a key design trade-off in embedded system designs. For system-on-a-chip embedded systems, an external bus interconnects embedded processor cores, I/O peripherals, a direct memory access (DMA) controller, and off-chip memory. External memory access activities are a major source of energy consumption in embedded systems, and especially in multimedia platforms. In this ...

Journal: :Microprocessors and Microsystems - Embedded Hardware Design 2015
Mingjie Lin Shaoyi Cheng Ronald F. DeMara John Wawrzynek

Emerging integrated CPU + FPGA hybrid platforms, such as the Extensible Processing Platform architecture from Xilinx [1], offer unprecedented opportunity to achieving both multifunctionality and real-time responsiveness for memory-intensive embedded applications. However, how to cost-effectively synthesize application-specific hardware constructs that fully exploit memory-level parallelism rema...

Journal: :JCS 2014
Govindarajalu Bakthavatsalam K. M. Mehata

Embedded computing differs from general purpose computing in several aspects. In most embedded systems, size, cost and power consumption are more important than performance. In embedded System-onChips (SoC), memory is a scarce resource and it poses constraints on chip space, cost and power consumption. Whereas fixed instruction length feature of RISC architecture simplifies instruction decoding...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید