Essays about: "Virtual instrumentation"
Showing result 1 - 5 of 9 essays containing the words Virtual instrumentation.
-
1. The Gunnlod Dataset : Engineering a dataset for multi-modal music generation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This report details the creation of a new dataset named the Gunnlod dataset (after the Norse giantess who guarded the mead of poetry) for use in research in the field of machine learning as applied to music creation, particularly multi-modal music in the MIDI format of symbolic music representation. The dataset is based on a subset of approximately four fifths of the Lakh MIDI dataset. READ MORE
-
2. Throughput Analysis of Safepoint-attached Barriers in a Low-latency Garbage Collector : Analysis of a Compiler Optimization in the HotSpot JVM
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : When using managed programming languages, there is an essential benefit in having a fast and efficient compiler and garbage collector; one garbage collector currently under development is the HotSpot low-latency concurrent Generational Z Garbage Collector. Concurrent memory management runs application threads and garbage collection threads simultaneously. READ MORE
-
3. PXI Communication in a virtual environment : Using containers and VMs for communication with a PXI
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis investigates the possibility of communication with a PCI eXtensions for Instrumentation (PXI) system from inside of a container or a virtual machine (VM). While the usage of virtual environments with PCI have been established, it was unknown whether it is possible to have an application running inside of a virtual environment and have it communicate with a PXI system outside this environment. READ MORE
-
4. Discovering and masking environmental features in modern sandboxes
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The awareness of cyber attacks in businesses is increasing with the rising number of cyber incidents for businesses. With nearly 350 000 new malware detected per day, there is a big incentive to allocate resources to company infrastructure to mitigate malware. These solutions require scalability not to become bottlenecks and expensive. READ MORE
-
5. Visual Analytics Tool for Java Virtual Machine Execution Traces
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The usage of multithreaded programs is continuously increasing, which leads to various concurrency issues. The non-deterministic approach of the thread scheduler makes the analysis of such programs complex. Thread-based visualization of the concurrent events helps to analyze a concurrent program efficiently. READ MORE