The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
the river discharge measurement is one of the basic projects of hygrometry; it determines the water resource utilization. However, a substantial increase in the number of hydrological site, especially for the unmanned hydrometric station brought great difficulty and caused the more workload for the Hydrologists every year. With the development of sensor technology and the data acquisition and fusion...
Co-designed Virtual Machine (Co-VM) technique combining software and hardware enables a different approach to microprocessor design, where the host architecture is designed concurrently with the software that runs on it. The key of a Co-VM is to emulate the source architecture on the target architecture through interpretation and binary translation. There is some commonness of different Co-VMs. In...
XML (Extensible Markup Language) is a general language for representation of arbitrary data structures. It has been widely used in Internet applications and in computer systems because of the extension and user customization features. In order to parse XML documents efficiently, much research has been done to accelerate the processing of XML documents or messages. The hardware-accelerated approach...
Interpretation and basic block translation (BBT) are two typical strategies for cold code emulation in a dynamic binary translation (DBT) system. More and more DBT systems employ BBT as the generated native code runs more efficient than the interpretation routines. We observe that BBT's high efficiency is based on those special hardware assists. With certain simple hardware techniques, interpretation...
This paper analyzes the computer network security features and the main threat, synthesis the firewall technology of current domestic and international, on the basis of various firewalls' principles, advantages and shortcomings. Through the synthesis and compare of various techniques, in-depth study of the main factors affection firewall performance, combined with the network status quo of Heilongjiang...
An interpreter reads instructions of the source executable and perform each corresponding operation in turn on a software-maintained version of the old ISA's state. Interpretation has emerged as an important tool with real world applications. Interpretation is always adopted to support instruction set emulation and handle the non-hotspot code in a two-stage dynamic binary translation strategy. An...
Abstract- Dynamic binary translation (DBT) converts codes written for a source instruction set architecture (ISA) into optimized code for a target ISA. DBT has emerged as an important tool with real world applications. Interpretation is always adopted to handle the non hotspot code in a two stage DBT system. An important consideration in such DBT systems is the interpretation overhead. We investigate...
Previous full virtualization techniques are implemented in software without any hardware assist. In this paper, for the first time, we propose an advanced hardware assisted full virtualization architecture-Dynamic Binary Translation in DIMM (DBTIM). We integrate a reconfigurable dynamic binary translation chip into a DIMM. DBTIM could be inserted to the mainboard as a normal DIMM, hence easily making...
Virtual machine technology is rapidly emerging as an important component of future computer systems. Full virtualization with dynamic binary translation outperforms paravirtualization and hardware assisted virtualization in x86 CPU virtualization. Previous full virtualization techniques are implemented in software without any hardware assist. In this paper, for the first time, we propose a novel hardware...
Continuous auditing is an active research domain in computer-assisted audit field, and online auditing studied in China is also one mode of continuous auditing, The audit evidence gathering mode changed under online auditing environment, which will influence the audit evidence gathering cost. In this paper, audit evidence gathering method under online audit environment is introduced. Then, the components...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.