共查询到20条相似文献,搜索用时 31 毫秒
1.
The paradigm of Trusted Computing promises a new approach to improve the security of computer systems. The core functionality, based on a hardware component known as Trusted Platform Module, is integrated into commodity hardware. However, operating system integration and application software support remains limited at present. In particular, for Java, the most widely used platform‐independent computing environment, there is currently no generally accepted Trusted Computing API. In this article, we describe the design of a high‐level API for Trusted Computing. We report on the current state of the Trusted Computing Group's software architecture and on previous approaches targeting Java. We derive our requirements and design goals and describe a novel API design. We report on our transparent approach to standardization in the Java Community Process. The result of this effort is the API we propose in the Java Specification Request 321. In this work, we not only present the design of this new API but also discuss implementation and testing strategies. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
2.
3.
USB总线(通用串行总线)快速可靠,便捷易用,是一种理想的数据传输方法。介绍了一种在PCI总线系统中利用软硬件相结合的方式采集并通过USB实时什榆数据的方法,从采集系统的工作原理和硬件、软件的实现方法等方面对采集系统的设计进行了说明,着重介绍了USB设备及主机软件的设计方法。 相似文献
4.
《Journal of Systems Architecture》2014,60(1):40-51
Power-efficiency has been a key issue for today’s application and system design, ranging from embedded systems to data centers. While application-specific designs and optimizations may improve the power efficiency, it requires significant efforts to co-design the hardware and software, which are difficult to re-use. On the hardware front, the trend of heterogeneous computing enables custom designs for specific applications by integrating different types of processors and reconfigurable hardware to handle compute-intensive tasks. However, what is still missing is an elegant application framework, i.e., a programming environment and a runtime system, to develop portable applications which can offload tasks or be reconfigured dynamically to run on a variety of systems efficiently.Our ongoing work, MobileFBP, provides an application framework which aims to support heterogeneous and reconfigurable systems. Using the framework, the developers build portable applications with a dataflow programming paradigm, and the MobileFBP runtime system dynamically schedules the task components to run on available computing resources locally or remotely based on the application profiles. We hope that this ability produces high-level portable applications and reduces the efforts and skills needed for the developers to optimize their applications on a range of systems. This paper describes this work and presents our preliminary results. 相似文献
5.
针对无线电管理部门大规模信号监测的应用需求,设计了一种基于异构多核 Zynq-7000的嵌入式无线电信号采集监测系统.该系统在硬件上采用了射频捷变收发器AD9361作为接收前端,Zynq-7000作为处理核心;在软件上实现了 NEON和 VFP的硬件加速,以 QT为框架开发了用户显示界面.在详细阐述该终端在硬件逻辑设计、嵌入式设计和应用软件设计的基础上,通过试验展示了其所具有的数据采集、频谱监测和数据可视化等功能.这为轻便、灵巧、低成本、便携式无线电信号监测系统的研发提供了重要参考. 相似文献
6.
This paper addresses public key cryptosystems based on elliptic curves, which are aimed to high-performance digital signature schemes. Elliptic curve algorithms are characterized by the fact that one can work with considerably shorter keys compared to the RSA approach at the same level of security. A general and highly efficient method for mapping the most time-critical operations to a configurable co-processor is proposed. By means of real-time measurements the resulting performance values are compared to previously published state of the art hardware implementations.
A generator based approach is advocated for that purpose which supports application specific co-processor configurations in a flexible and straight forward way. Such a configurable CryptoProcessor has been integrated into a Java-based digital signature environment resulting in a considerable increase of its performance. The outlined approach combines in an unique way the advantages of mapping functionality to either hardware or software and it results in high-speed cryptosystems which are both portable and easy to update according to future security requirements. 相似文献
7.
基于DSP的有源电力滤波器控制系统设计 总被引:2,自引:0,他引:2
首先介绍了基于DSP的全数字化电压并联型三相有源电力滤波器控制系统的研制,该平台的核心数字处理芯片为TMS320LF2407;补偿指令电流的检测算法为ip、iq运算法;使用间接三角波比较法的电流控制方案。并详细阐述了该平台的硬件接口和软件设计。 相似文献
8.
9.
10.
11.
Leslie G. Valiant 《Journal of Computer and System Sciences》2011,77(1):154-166
Writing software for one parallel system is a feasible though arduous task. Reusing the substantial intellectual effort so expended for programming a second system has proved much more challenging. In sequential computing algorithms textbooks and portable software are resources that enable software systems to be written that are efficiently portable across changing hardware platforms. These resources are currently lacking in the area of multi-core architectures, where a programmer seeking high performance has no comparable opportunity to build on the intellectual efforts of others. In order to address this problem we propose a bridging model aimed at capturing the most basic resource parameters of multi-core architectures. We suggest that the considerable intellectual effort needed for designing efficient algorithms for such architectures may be most fruitfully expended in designing portable algorithms, once and for all, for such a bridging model. Portable algorithms would contain efficient designs for all reasonable combinations of the basic resource parameters and input sizes, and would form the basis for implementation or compilation for particular machines. Our Multi-BSP model is a multi-level model that has explicit parameters for processor numbers, memory/cache sizes, communication costs, and synchronization costs. The lowest level corresponds to shared memory or the PRAM, acknowledging the relevance of that model for whatever limitations on memory and processor numbers it may be efficacious to emulate it. We propose parameter-aware portable algorithms that run efficiently on all relevant architectures with any number of levels and any combination of parameters. For these algorithms we define a parameter-free notion of optimality. We show that for several fundamental problems, including standard matrix multiplication, the Fast Fourier Transform, and comparison sorting, there exist optimal portable algorithms in that sense, for all combinations of machine parameters. Thus some algorithmic generality and elegance can be found in this many parameter setting. 相似文献
12.
13.
《Information and Software Technology》2002,44(6):343-350
System availability is a major performance concern in distributed systems design and analysis. A typical kind of application on distributed systems has a homogeneously distributed software/hardware structure. That is, identical copies of distributed application software run on the same type of computers. In this paper, the system availability for this type of system is studied. Such a study is useful when studying optimal testing time or testing resource allocation. We consider both the case of simple two-host system, and also the more general case of multi-host system. A Markov model is developed and equations are derived to obtain the steady-state availability. Both software and hardware failures are considered, assuming that software faults are constantly being identified and removed upon a failure. Although a specific model for software reliability is used for illustration, the approach is a general one. Comparisons show that system availability changes in a similar way to single-host based software/hardware systems. Sensitivity analysis is also presented. In addition, the assumptions used in this paper are discussed. 相似文献
14.
15.
16.
《Computer Physics Communications》1986,41(2-3):197-203
The paper gives first a survey of the development of computational physics in the general context of computer science. Then new methods of software engineering, artificial intelligence and functional languages are presented on examples with respect to applications in physics. It concludes with some speculations about the future of computational physics especially regarding the lectures at the 6th Summer School on Computing Techniques in Physics. 相似文献
17.
汪强 《计算机工程与设计》2008,29(4):875-878
针对基于CPCI总线的嵌入式计算机设计中遇到的底层驱动软件与具体硬件芯片相互关联的问题,开展了嵌入式计算机通用接口设计的研究.采用软件、硬件与现场可编程技术相互结合的设计方法,通过通用硬件接1:1电路设计、共享存储区设计、通用函数设计,实现了基于CPCI总线的嵌入式计算机通用接口,并成功应用于具体的工程实践. 相似文献
18.
《Design & Test of Computers, IEEE》2007,24(6):516-516
The design of secure and trusted embedded systems has recently drawn enormous attention from system-design practitioners. A secure system is only as strong as the weakest link. Therefore, any security functions implemented in an embedded system must be considered in both hardware and software, at all design abstraction levels, in communications between components, and in the manufacturing phase. In addition, these implementations are subject to typical power, performance, and cost constraints of consumer embedded systems. This issue of IEEE Design & Test features a special issue on Design and Test of Integrated Circuits for Secure Embedded Computing. 相似文献
19.
20.
Kateryna Kuksenok Cecilia Aragon James Fogarty Charlotte P. Lee Gina Neff 《Computer Supported Cooperative Work (CSCW)》2017,26(4-6):663-691
Computing affects how scientific knowledge is constructed, verified, and validated. Rapid changes in hardware capability, and software flexibility, are coupled with a volatile tool and skill set, particularly in the interdisciplinary scientific contexts of oceanography. Existing research considers the role of scientists as both users and producers of code. We focus on how an intentional, individually-initiated but socially-situated, process of uptake influences code written by scientists. We present an 18-month interview and observation study of four oceanography teams, with a focus on ethnographic shadowing of individuals undertaking code work. Through qualitative analysis, we developed a framework of deliberate individual change, which builds upon prior work on programming practices in science through the lens of sociotechnical infrastructures. We use qualitative vignettes to illustrate how our theoretical framework helps to understand changing programming practices. Our findings suggest that scientists use and produce software in a way that deliberately mitigates the potential pitfalls of their programming practice. In particular, the object and method of visualization is subject to restraint intended to prevent accidental misuse. 相似文献