Sciweavers

1155 search results - page 149 / 231
» Designing Benchmarks for P2P Systems
Sort
View
CF
2007
ACM
15 years 2 months ago
Accelerating memory decryption and authentication with frequent value prediction
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have...
Weidong Shi, Hsien-Hsin S. Lee
WDAG
2005
Springer
103views Algorithms» more  WDAG 2005»
15 years 3 months ago
Adaptive Software Transactional Memory
Software Transactional Memory (STM) is a generic synchronization construct that enables automatic conversion of correct sequential objects into correct nonblocking concurrent obje...
Virendra J. Marathe, William N. Scherer III, Micha...
ISCA
1994
IEEE
123views Hardware» more  ISCA 1994»
15 years 2 months ago
Software-Extended Coherent Shared Memory: Performance and Cost
This paper evaluates the tradeoffs involved in the design of the software-extended memory system of Alewife, a multiprocessor architecturethat implements coherentsharedmemorythrou...
David Chaiken, Anant Agarwal
ICCV
2009
IEEE
1075views Computer Vision» more  ICCV 2009»
16 years 3 months ago
LabelMe video: Building a Video Database with Human Annotations
Currently, video analysis algorithms suffer from lack of information regarding the objects present, their interactions, as well as from missing comprehensive annotated video dat...
Jenny Yuen, Bryan Russell, Ce Liu, Antonio Torralb...
ECOOP
2009
Springer
15 years 10 months ago
Loci: Simple Thread-Locality for Java
This paper presents a simple type system for thread-local data in Java. Classes and types are annotated to express thread-locality and unintended leaks are detected at compile-time...
Tobias Wrigstad, Filip Pizlo, Fadi Meawad, Lei Zha...