Sciweavers

34 search results - page 7 / 7
» Compiling scheme to JVM bytecode: : a performance study
Sort
View
MAM
2007
90views more  MAM 2007»
13 years 5 months ago
Clustered indexing for branch predictors
ct 8 As a result of resource limitations, state in branch predictors is frequently shared between uncorrelated branches. This interference 9 can significantly limit prediction acc...
Veerle Desmet, Hans Vandierendonck, Koen De Bossch...
ESOP
2008
Springer
13 years 6 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
13 years 11 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
BMCBI
2010
125views more  BMCBI 2010»
13 years 5 months ago
A computational screen for site selective A-to-I editing detects novel sites in neuron specific Hu proteins
Background: Several bioinformatic approaches have previously been used to find novel sites of ADAR mediated A-to-I RNA editing in human. These studies have discovered thousands of...
Mats Ensterö, Örjan Åkerborg, Dani...