Search results for "Microcode"
showing 4 items of 4 documents
Experimental Assessment of the Backoff Behavior of Commercial IEEE 802.11b Network Cards
2007
It has been observed that different IEEE 802.11 commercial cards produced by different vendors experience different performance, either when accessing alone the channel, as well as when competing against each other. These differences persist also when thorough measurement methodologies (such as RF shielding, laptop rotation, etc) are applied, and alignment of the environmental factors (same laptop models, traffic generators, etc) is carried out. This paper provides an extensive experimental characterization of the backoff operation of six commercial NIC cards. It suggests a relevant methodological approach, namely a repeatable, well defined, set of experiments, for such a characterization. …
A Formal Model for Developing of the self-Diagosing and Self-Repairing 8-Bits Microprocessor, and Its Investigation Using Simulation
1986
Abstract The complete model of functional diagnostics is theoretically described. It specifies the conditions, which must be satisfied if the system to be self-diagnosable. The general principles of constructing self-diagnosable systems are enumerated. The model enables the realization of self-renewal, too. The model has been developed on the basis of the works by Preparata, Metze, Chien (1967) and Hakimi, Amin (1974) . The model contains a method of diagnostics completely separeted from the physical structure of the system. Recent results (Gruber, 1978; Swiatek, 1982) indicate that it is only necessary to know the set of transformations realized by the circuit. The model has been applied t…
An embedded datalogger with a fast acquisition rate for in-vehicle testing and monitoring
2011
A very compact and high performance datalogger for automotive in-vehicle testing is here described. The small logger dimensions and the availability of a CAN interface allows to easily implement multiple and distributed acquisition schemes, very challenging with traditional instrumentation. High acquisition rate, up to 100 Ksps/ch, and low cost was obtained through a very accurate hardware and software design.
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed