Sciweavers

2615 search results - page 287 / 523
» Analysis of Real Time Operating System Based Applications
Sort
View
122
Voted
DSD
2006
IEEE
110views Hardware» more  DSD 2006»
15 years 9 months ago
A Graph Based Algorithm for Data Path Optimization in Custom Processors
The rising complexity, customization and short time to market of modern digital systems requires automatic methods for generation of high performance architectures for such system...
Jelena Trajkovic, Mehrdad Reshadi, Bita Gorjiara, ...
134
Voted
IPPS
2010
IEEE
15 years 1 months ago
Overlapping computation and communication: Barrier algorithms and ConnectX-2 CORE-Direct capabilities
Abstract--This paper explores the computation and communication overlap capabilities enabled by the new CORE-Direct hardware capabilities introduced in the InfiniBand (IB) Host Cha...
Richard L. Graham, Stephen W. Poole, Pavel Shamis,...
144
Voted
CCS
2008
ACM
15 years 5 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 10 months ago
Utility-Based User Grouping and Bandwidth Allocation for Wireless Multicast Systems
Abstract—With the proliferation of wireless multimedia applications, multicast/broadcast has been recognized as an efficient technique to transmit a large volume of data to mult...
Juan Liu, Wei Chen, Zhigang Cao, Ying Jun Zhang, S...
112
Voted
LCTRTS
2005
Springer
15 years 9 months ago
Syncopation: generational real-time garbage collection in the metronome
Real-time garbage collection has been shown to be feasible, but for programs with high allocation rates, the utilization achievable is not sufficient for some systems. Since a hi...
David F. Bacon, Perry Cheng, David Grove, Martin T...