Sciweavers

3865 search results - page 36 / 773
» Active memory operations
Sort
View
141
Voted
SOSP
2007
ACM
16 years 1 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
CARDIS
2004
Springer
93views Hardware» more  CARDIS 2004»
15 years 9 months ago
On-the-Fly Metadata Stripping for Embedded Java Operating Systems
Considering the typical amount of memory available on a smart card, it is essential to minimize the size of the runtime environment to leave as much memory as possible to applicati...
Christophe Rippert, Damien Deville
IEEEPACT
2002
IEEE
15 years 9 months ago
Software Bubbles: Using Predication to Compensate for Aliasing in Software Pipelines
This paper describes a technique for utilizing predication to support software pipelining on EPIC architectures in the presence of dynamic memory aliasing. The essential idea is t...
Benjamin Goldberg, Emily Crutcher, Chad Huneycutt,...
ECSCW
2007
15 years 5 months ago
Instrumental action: the timely exchange of implements during surgical operations
In this paper we analyse an apparently simple collaborative activity, that of passing an implement from one person to another. The particular case we consider is surgical operation...
Marcus Sanchez Svensson, Christian Heath, Paul Luf...
101
Voted
CCE
2007
15 years 4 months ago
Optimal operation of simple refrigeration cycles: Part I: Degrees of freedom and optimality of sub-cooling
The paper focuses on the operation of simple refrigeration cycles. With equipment given, there are, from a control and operational point of view, five steady-state degrees of fre...
Jørgen Bauck Jensen, Sigurd Skogestad