Sciweavers

321 search results - page 64 / 65
» Data management with SAPs in-memory computing engine
Sort
View
IEEEPACT
2009
IEEE
14 years 1 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
EMSOFT
2007
Springer
14 years 16 days ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
PLDI
2006
ACM
14 years 10 days ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
STORAGESS
2005
ACM
13 years 12 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
CONCURRENCY
2008
119views more  CONCURRENCY 2008»
13 years 6 months ago
InterGrid: a case for internetworking islands of Grids
: Over the last few years, several nations around the world have set up Grids to share resources such as computers, data, and instruments to enable collaborative science, engineeri...
Marcos Dias de Assunção, Rajkumar Bu...