Sciweavers

2880 search results - page 115 / 576
» Aspects of Memory Management
Sort
View
153
Voted
MASCOTS
2004
15 years 6 months ago
Mining Performance Data from Sampled Event Traces
The prominent role of the memory hierarchy as one of the major bottlenecks in achieving good program performance has motivated the search for ways of capturing the memory performa...
Ricardo Portillo, Diana Villa, Patricia J. Teller,...
123
Voted
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
15 years 9 months ago
EasyWinWin: Managing Complexity in Requirements Negotiation with GSS
More than ¾ of large software projects suffer large cost and schedule overruns or fail outright. Deficits in project requirements cause more than half of these failures and overr...
Robert O. Briggs, Paul Grünbacher
ASIACRYPT
2009
Springer
15 years 11 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...
ASPLOS
1996
ACM
15 years 8 months ago
Shasta: A Low Overhead, Software-Only Approach for Supporting Fine-Grain Shared Memory
This paper describes Shasta, a system that supports a shared address space in software on clusters of computers with physically distributed memory. A unique aspect of Shasta compa...
Daniel J. Scales, Kourosh Gharachorloo, Chandramoh...
213
Voted
SBBD
2008
256views Database» more  SBBD 2008»
15 years 6 months ago
Indexing Internal Memory with Minimal Perfect Hash Functions
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...