Sciweavers

ICDM
2002
IEEE
133views Data Mining» more  ICDM 2002»
13 years 9 months ago
Learning with Progressive Transductive Support Vector Machine
Support vector machine (SVM) is a new learning method developed in recent years based on the foundations of statistical learning theory. By taking a transductive approach instead ...
Yisong Chen, Guoping Wang, Shihai Dong
WMPI
2004
ACM
13 years 10 months ago
Selective main memory compression by identifying program phase changes
During a program’s runtime, the stack and data segments of the main memory often contain much redundancy, which makes them good candidates for compression. Compression and decomp...
Doron Nakar, Shlomo Weiss
COLT
2005
Springer
13 years 10 months ago
General Polynomial Time Decomposition Algorithms
We present a general decomposition algorithm that is uniformly applicable to every (suitably normalized) instance of Convex Quadratic Optimization and efficiently approaches an o...
Nikolas List, Hans-Ulrich Simon
CGO
2006
IEEE
13 years 11 months ago
Region Monitoring for Local Phase Detection in Dynamic Optimization Systems
Dynamic optimization relies on phase detection for two important functions (1) To detect change in code working set and (2) To detect change in performance characteristics that ca...
Abhinav Das, Jiwei Lu, Wei-Chung Hsu
ISCA
2007
IEEE
177views Hardware» more  ISCA 2007»
13 years 11 months ago
Adaptive insertion policies for high performance caching
The commonly used LRU replacement policy is susceptible to thrashing for memory-intensive workloads that have a working set greater than the available cache size. For such applica...
Moinuddin K. Qureshi, Aamer Jaleel, Yale N. Patt, ...
IEEEPACT
2008
IEEE
13 years 11 months ago
Adaptive insertion policies for managing shared caches
Chip Multiprocessors (CMPs) allow different applications to concurrently execute on a single chip. When applications with differing demands for memory compete for a shared cache, ...
Aamer Jaleel, William Hasenplaugh, Moinuddin K. Qu...
SACMAT
2009
ACM
13 years 11 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
MICRO
2009
IEEE
159views Hardware» more  MICRO 2009»
13 years 11 months ago
Adaptive line placement with the set balancing cache
Efficient memory hierarchy design is critical due to the increasing gap between the speed of the processors and the memory. One of the sources of inefficiency in current caches is...
Dyer Rolán, Basilio B. Fraguela, Ramon Doal...
ICS
2009
Tsinghua U.
13 years 11 months ago
Less reused filter: improving l2 cache performance via filtering less reused lines
The L2 cache is commonly managed using LRU policy. For workloads that have a working set larger than L2 cache, LRU behaves poorly, resulting in a great number of less reused lines...
Lingxiang Xiang, Tianzhou Chen, Qingsong Shi, Wei ...