Sciweavers

681 search results - page 97 / 137
» Columnar objects: improving the performance of analytical ap...
Sort
View
ASPLOS
2004
ACM
15 years 4 months ago
Software prefetching for mark-sweep garbage collection: hardware analysis and software redesign
Tracing garbage collectors traverse references from live program variables, transitively tracing out the closure of live objects. Memory accesses incurred during tracing are essen...
Chen-Yong Cher, Antony L. Hosking, T. N. Vijaykuma...
TPDS
2008
105views more  TPDS 2008»
14 years 11 months ago
Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks
Consistency maintenance is important to the sharing of dynamic contents in peer-to-peer (P2P) networks. The TTL-based mechanism is a natural choice for maintaining freshness in P2P...
Xueyan Tang, Jianliang Xu, Wang-Chien Lee
ASPLOS
2008
ACM
15 years 1 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
98
Voted
INFOCOM
2002
IEEE
15 years 4 months ago
Energy-Limited Wireless Networking with Directional Antennas: The Case of Session-Based Multicasting
— We consider ad hoc wireless networks that use directional antennas and have limited energy resources. The performance objectives of such networks depend largely on the applicat...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
IWMM
2000
Springer
108views Hardware» more  IWMM 2000»
15 years 2 months ago
Implementing an On-the-Fly Garbage Collector for Java
Java uses garbage collection (GC) for the automatic reclamation of computer memory no longer required by a running application. GC implementations for Java Virtual Machines (JVM) ...
Tamar Domani, Elliot K. Kolodner, Ethan Lewis, Eli...