نتایج جستجو برای: emulation

تعداد نتایج: 3909  

1998
Reza Sedaghat-Maman Erich Barke

A hardware based approach to Fault Emulation independent of the logic emulation system in use has been developed and is presented in this paper. Fault injection into a targetted circuit is made possible with the introduction of additional logic. The stuck-at-fault model is simulated with the method described here, which may also be used for multiple faults and bridging faults [1]. This discussi...

2002
Daniel P. Julin

The Mach 3.0 micro-kernel provides a foundation for the emulation of various operating systems with a combination of libraries and Mach servers. We present a general-purpose naming facility to help construct such emulation systems by assembling many independent servers. This facility defines a set of standard interfaces for a uniform name space with uniform access mediation and a set of practic...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 1999
Darko Kirovski Miodrag Potkonjak Lisa M. Guerra

Growing design complexity has made functional debugging of application-specific integrated circuits crucial to their development. Two widely used debugging techniques are simulation and emulation. Design simulation provides good controllability and observability of the variables in a design, but is two to ten orders of magnitude slower than the fabricated design. Design emulation and fabricatio...

2011
Emmanuel Lochin Laurent Dairaine

The design and development of a complex system requires an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the functional and non-functional properties of the tested protocols. Among the various tools used to provide experimental support for such developments, network emulation relies on real-time production of impairments on real traffi...

2003
Tim Frost

.......................................................................................................................... 2 Carrying TDM Services over a Packet Network .............................................................. 2 An Evolutionary Approach ........................................................................................... 3 Standards .....................................

1995
James Gateley Miriam Blatt Dennis Chen Scott Cooke Piyush Desai Manjunath Doreswamy Mark Elgood Gary Feierbach Tim Goldsbury Dale Greenley Raju Joshi Mike Khosraviani Robert Kwong Manish Motwani Chitresh Narasimhaiah Sam J. Nicolino Tooru Ozeki Gary Peterson Chris Salzmann Nasser Shayesteh Jeffrey Whitman Pak Wong

The next generation UltraSPARC-I CPU represents a significant step forward in processor performance at the cost of increased design complexity. Added complexity increases the risks in achieving functionally correct first silicon. Existing design verification techniques were supplemented by applying emulation to obtain an early look at functionality. Discussed are the goals, methods and results ...

2008
David Carroll

This paper describes the Communications Interface Protocol that was implemented successfully as a co-emulation modelling interface between SystemC model and a reconfigurable hardware platform. The information presented represents part of research into the suitability of using SystemC, in conjunction with a suitable reconfigurable hardware system platform, to provide a real-time emulation enviro...

Journal: :Proceedings. Biological sciences 2008
Lydia M Hopper Susan P Lambeth Steven J Schapiro Andrew Whiten

Emulation has been distinguished from imitation as a form of observational learning because it focuses not on the model's actions but on the action's environmental results. Whether a species emulates, imitates or displays only simpler observational learning is expected to have profound implications for its capacity for cultural transmission. Chimpanzees' observational learning has been suggeste...

Journal: :TinyToCS 2012
Collin Mulliner

Today’s malware contains sophisticated analysis countermeasures to protect itself against reverse engineering. Countermeasures fall into two categories: offline and runtime. Encryption and obfuscation of binaries are widely used offline protections. Therefore today, most analysis is done during runtime and so malware authors implement runtime countermeasures. Runtime countermeasures include ant...

Journal: :Journal of Philosophical Logic 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید