Sciweavers

13841 search results - page 2601 / 2769
» Algorithms and Constraint Programming
Sort
View
123
Voted
ICS
1993
Tsinghua U.
15 years 7 months ago
Static and Dynamic Evaluation of Data Dependence Analysis
—Data dependence analysis techniques are the main component of today’s strategies for automatic detection of parallelism. Parallelism detection strategies are being incorporate...
Paul Petersen, David A. Padua
VLDB
1994
ACM
128views Database» more  VLDB 1994»
15 years 7 months ago
An Algebraic Approach to Rule Analysis in Expert Database Systems
Expert database systems extend the functionality of conventional database systems by providing a facility for creating and automatically executing Condition-Action rules. While Con...
Elena Baralis, Jennifer Widom
ASPDAC
2007
ACM
100views Hardware» more  ASPDAC 2007»
15 years 7 months ago
Micro-architecture Pipelining Optimization with Throughput-Aware Floorplanning
- For modern processor designs in nanometer technologies, both block and interconnect pipelining are needed to achieve multi-gigahertz clock frequency, but previous approaches cons...
Yuchun Ma, Zhuoyuan Li, Jason Cong, Xianlong Hong,...
CASES
2007
ACM
15 years 7 months ago
A backtracking instruction scheduler using predicate-based code hoisting to fill delay slots
Delayed branching is a technique to alleviate branch hazards without expensive hardware branch prediction mechanisms. For VLIW processors with deep pipelines and many issue slots,...
Tom Vander Aa, Bingfeng Mei, Bjorn De Sutter
IWMM
2010
Springer
137views Hardware» more  IWMM 2010»
15 years 7 months ago
The locality of concurrent write barriers
Concurrent and incremental collectors require barriers to ensure correct synchronisation between mutator and collector. The overheads imposed by particular barriers on particular ...
Laurence Hellyer, Richard Jones, Antony L. Hosking
« Prev « First page 2601 / 2769 Last » Next »