This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
IP Geofencing : | |
[1] Venkata N. Padmanabhan, Lakshminarayanan Subramanian, “An | |
investigation of geographic mapping techniques for internet hosts”, | |
Proceedings of ACMSIGCOMM, p.173-185, August 2001, San | |
Diego, CA, USA | |
In this paper, we ask whether it is possible to build an IP address to geographic location mapping service for Internet hosts. Such a service would enable a large and interesting class of location-aware applications. | |
This is a challenging problem because an IP address does not inherently contain an indication of location. We present and evaluate three distinct techniques, collectively referred to as IP2Geo, | |
for determining the geographic location of Internet hosts. The first technique, Geo Track, infers location based on the DNS names of the target host or other nearby network nodes. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
However, NVM has certain disadvantages for write references, | |
due to its high dynamic energy consumption for writes and low bandwidth compared to DRAM writes. | |
Literature review: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* Copyright (c) 2010-2012,2017 ARM Limited | |
* All rights reserved | |
* | |
* The license below extends only to copyright in the software and shall | |
* not be construed as granting a license to any other intellectual | |
* property including but not limited to intellectual property relating | |
* to a hardware implementation of the functionality of the software | |
* licensed hereunder. You may use the software subject to the license | |
* terms below provided that you ensure that this notice is replicated |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
module mem_ram_sync( | |
clk, | |
rst, | |
read_rq, | |
write_rq, | |
rw_address, | |
write_data, | |
read_data | |
); | |
input clk; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
HEY RANDOM STRANGER, NOTHIN' TO SEE HERE, BUT DO LEAVE A COMMENT IF U HAVE ANY POINTS TO ADD | |
--------------------------------------------------------------------------------------------- | |
[run] | |
gcc main.c buffer.c -lpthread && ./a.out | |
[comments] | |
* This is too simple and I have used a fixed sized ring ( circular queue ) buffer, so I don't have to deal with overflow | |
* hardcorded the randomness into the code : see "sleep(rand()%5);" please adjust accordingly | |
* Seems to be working, but i dunno if this satisfies all the condition |
OlderNewer