Sciweavers

631 search results - page 107 / 127
» Composable memory transactions
Sort
View
ISCA
1998
IEEE
135views Hardware» more  ISCA 1998»
15 years 1 months ago
Branch Prediction Based on Universal Data Compression Algorithms
Data compression and prediction are closely related. Thus prediction methods based on data compression algorithms have been suggested for the branch prediction problem. In this wo...
Eitan Federovsky, Meir Feder, Shlomo Weiss
CF
2005
ACM
14 years 11 months ago
Owl: next generation system monitoring
As microarchitectural and system complexity grows, comprehending system behavior becomes increasingly difficult, and often requires obtaining and sifting through voluminous event ...
Martin Schulz, Brian S. White, Sally A. McKee, Hsi...
ACSW
2007
14 years 11 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
COOTS
1997
14 years 11 months ago
Making CORBA Objects Persistent: the Object Database Adapter Approach
This paper discusses a realization of object persistence in a CORBA-based distributed system. In our approach, persistence of CORBA objects is accomplished by the integration of t...
Francisco C. R. Reverbel, Arthur B. Maccabe
OSDI
1996
ACM
14 years 11 months ago
Dealing with Disaster: Surviving Misbehaved Kernel Extensions
Today's extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to run in the kernel address space. The advanta...
Margo I. Seltzer, Yasuhiro Endo, Christopher Small...