Sciweavers

7504 search results - page 1366 / 1501
» Computing with Action Potentials
Sort
View
114
Voted
ICCS
2003
Springer
15 years 8 months ago
Method Call Acceleration in Embedded Java Virtual Machines
Object oriented languages, in particular Java, use a frequent dynamic dispatch mechanism to search for the definition of an invoked method. A method could be defined in more than...
Mourad Debbabi, M. M. Erhioui, Lamia Ketari, Nadia...
106
Voted
ICS
2003
Tsinghua U.
15 years 8 months ago
Reducing register ports using delayed write-back queues and operand pre-fetch
In high-performance wide-issue microprocessors the access time, energy and area of the register file are often critical to overall performance. This is because these pararmeters g...
Nam Sung Kim, Trevor N. Mudge
132
Voted
AINA
2010
IEEE
15 years 8 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
130
Voted
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
15 years 8 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
134
Voted
ACSAC
2002
IEEE
15 years 8 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
« Prev « First page 1366 / 1501 Last » Next »