3,304 research outputs found
SimpleSSD: Modeling Solid State Drives for Holistic System Simulation
Existing solid state drive (SSD) simulators unfortunately lack hardware
and/or software architecture models. Consequently, they are far from capturing
the critical features of contemporary SSD devices. More importantly, while the
performance of modern systems that adopt SSDs can vary based on their numerous
internal design parameters and storage-level configurations, a full system
simulation with traditional SSD models often requires unreasonably long
runtimes and excessive computational resources. In this work, we propose
SimpleSSD, a highfidelity simulator that models all detailed characteristics of
hardware and software, while simplifying the nondescript features of storage
internals. In contrast to existing SSD simulators, SimpleSSD can easily be
integrated into publicly-available full system simulators. In addition, it can
accommodate a complete storage stack and evaluate the performance of SSDs along
with diverse memory technologies and microarchitectures. Thus, it facilitates
simulations that explore the full design space at different levels of system
abstraction.Comment: This paper has been accepted at IEEE Computer Architecture Letters
(CAL
Simulation of networks of spiking neurons: A review of tools and strategies
We review different aspects of the simulation of spiking neural networks. We
start by reviewing the different types of simulation strategies and algorithms
that are currently implemented. We next review the precision of those
simulation strategies, in particular in cases where plasticity depends on the
exact timing of the spikes. We overview different simulators and simulation
environments presently available (restricted to those freely available, open
source and documented). For each simulation tool, its advantages and pitfalls
are reviewed, with an aim to allow the reader to identify which simulator is
appropriate for a given task. Finally, we provide a series of benchmark
simulations of different types of networks of spiking neurons, including
Hodgkin-Huxley type, integrate-and-fire models, interacting with current-based
or conductance-based synapses, using clock-driven or event-driven integration
strategies. The same set of models are implemented on the different simulators,
and the codes are made available. The ultimate goal of this review is to
provide a resource to facilitate identifying the appropriate integration
strategy and simulation tool to use for a given modeling problem related to
spiking neural networks.Comment: 49 pages, 24 figures, 1 table; review article, Journal of
Computational Neuroscience, in press (2007
Set-top Box Simulator
This report presents a python-based Set-top box simulation program utilizing a Simulation library called SimPy (See Appendix 1) to simulate real-time operation of a Set-top Box, or DVR. A graphical user interface, designed with PyQt4, allows a user to customize many simulation parameters such as hard drive speeds, buffer sizes, length of simulation, etc. The GUI also shows the user any errors that occur during the simulation such as buffer overflows/underflows. The results of this simulator lie within 85%-95% accuracy depending on the user-input parameters. With this simulation program, a Set-top box hardware or firmware developer can interchange the scheduling algorithms and simulation parameters to find the ideal system to manufacture
The cyber security learning and research environment
This report outlines the design and configuration of the Cyber Security Learning and Research Environment (CLARE). It explains how such a system can be implemented with minimal hardware either on a single machine or across multiple machines. Moreover, details of the design of the components that constitute the environment are provided alongside sufficient implementation and configuration documentation to allow for replication of the environment
A Survey of Techniques for Improving Security of GPUs
Graphics processing unit (GPU), although a powerful performance-booster, also
has many security vulnerabilities. Due to these, the GPU can act as a
safe-haven for stealthy malware and the weakest `link' in the security `chain'.
In this paper, we present a survey of techniques for analyzing and improving
GPU security. We classify the works on key attributes to highlight their
similarities and differences. More than informing users and researchers about
GPU security techniques, this survey aims to increase their awareness about GPU
security vulnerabilities and potential countermeasures
Web-based CBR (case-based reasoning) as a tool with the application to tooling selection
Over the past few years, manufacturing companies
have had to deal with an increasing demand for feature-rich products at low costs. The pressures exerted on their existing manufacturing processes have lead manufacturers to investigate internet-based solutions, in order to cope with growing competition. The decentralisation phenomenon also came up as a reason to implement networked-application, which has been the starting point for internet/intranet–based systems. Today, the availability of powerful and low cost 3D tools, database backend systems, along with web-based technologies, provides interesting opportunities
to the manufacturing community, with solutions directly implementable at the core of their businesses and organisations. In this paper a web-based engineering approach is presented to developing a design support system using case-based reasoning (CBR) technology for helping in the decision-making process when choosing cutting tools. The system aims to provide on-line intelligent support for determining the most suitable configuration for turning operations, based on initial parameters and requirements for the cutting operation. The system also features a user-driven 3D turning simulator which allows testing the chosen insert for several turning operations. The system aims to be a useful e-manufacturing tool being able to quickly and responsively provide tooling data in a highly interactive way
Formal Requirements Elicitation with FRET
FRET is a tool for writing, understanding, formalizing and analyzing requirements. Users write requirements in an intuitive, restricted natural language, called FRETISH, with precise, unambiguous meaning. For a FRETISH requirement, FRET: 1) produces natural language and diagrammatic explanations of its exact meaning, 2) formalizes the requirement in logics, and 3) supports interactive simulation of produced logic formulas to ensure that they capture user intentions. FRET connects to analysis tools by facilitating the mapping between requirements and models/code, and by generating verification code. FRET is available open source at https://github.com/NASA-SW-VnV/fret; a video can be accessed at : https://tinyurl.com/fretForREFSQ
How migrating 0.0001% of address space saves 12% of energy in hybrid storage
We present a simple, operating-\ud
system independent method to reduce the num-\ud
ber of seek operations and consequently reduce\ud
the energy consumption of a hybrid storage\ud
device consisting of a hard disk and a flash\ud
memory. Trace-driven simulations show that\ud
migrating a tiny amount of the address space\ud
(0.0001%) from disk to flash already results\ud
in a significant storage energy reduction (12%)\ud
at virtually no extra cost. We show that the\ud
amount of energy saving depends on which part\ud
of the address space is migrated, and we present\ud
two indicators for this, namely sequentiality and\ud
request frequency. Our simulations show that\ud
both are suitable as criterion for energy-saving\ud
file placement methods in hybrid storage. We\ud
address potential wear problems in the flash\ud
subsystem by presenting a simple way to pro-\ud
long its expected lifetime.\u
- …