Sciweavers

3865 search results - page 65 / 773
» Active memory operations
Sort
View
128
Voted
VLDB
2002
ACM
126views Database» more  VLDB 2002»
15 years 4 months ago
ALIAS: An Active Learning led Interactive Deduplication System
Deduplication, a key operation in integrating data from multiple sources, is a time-consuming, labor-intensive and domainspecific operation. We present our design of alias that us...
Sunita Sarawagi, Anuradha Bhamidipaty, Alok Kirpal...
145
Voted
WMASH
2004
ACM
15 years 10 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
CAV
2010
Springer
179views Hardware» more  CAV 2010»
15 years 8 months ago
Generating Litmus Tests for Contrasting Memory Consistency Models
Well-defined memory consistency models are necessary for writing correct parallel software. Developing and understanding formal specifications of hardware memory models is a chal...
Sela Mador-Haim, Rajeev Alur, Milo M. K. Martin
158
Voted
FPGA
2010
ACM
181views FPGA» more  FPGA 2010»
15 years 8 months ago
Efficient multi-ported memories for FPGAs
Multi-ported memories are challenging to implement with FPGAs since the provided block RAMs typically have only two ports. We present a thorough exploration of the design space of...
Charles Eric LaForest, J. Gregory Steffan
174
Voted
ASPLOS
2008
ACM
15 years 6 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...