Sciweavers

1548 search results - page 271 / 310
» Estimating Software Vulnerabilities
Sort
View
MICRO
2000
IEEE
133views Hardware» more  MICRO 2000»
15 years 3 months ago
Compiler controlled value prediction using branch predictor based confidence
Value prediction breaks data dependencies in a program thereby creating instruction level parallelism that can increase program performance. Hardware based value prediction techni...
Eric Larson, Todd M. Austin
MSS
2000
IEEE
89views Hardware» more  MSS 2000»
15 years 3 months ago
Access Coordination of Tertiary Storage for High Energy Physics Applications
We describe a real implementation of a software component that manages caching of files from a tertiary storage management system to a large disk cache developed for use in the a...
Luis M. Bernardo, Arie Shoshani, Alex Sim, Henrik ...
RT
1999
Springer
15 years 3 months ago
Interactive Rendering using the Render Cache
Interactive rendering requires rapid visual feedback. The render cache is a new method for achieving this when using high-quality pixel-oriented renderers such as ray tracing that...
Bruce Walter, George Drettakis, Steven G. Parker
CPE
1998
Springer
81views Hardware» more  CPE 1998»
15 years 3 months ago
Experiments with Improved Approximate Mean Value Analysis Algorithms
Abstract. Approximate Mean Value Analysis (MVA) is a popular technique for analyzing queueing networks because of the efficiency and accuracy that it affords. In this paper, we pre...
Hai Wang, Kenneth C. Sevcik
92
Voted
DAC
2009
ACM
15 years 3 months ago
Reduction techniques for synchronous dataflow graphs
The Synchronous Dataflow (SDF) model of computation is popular for modelling the timing behaviour of real-time embedded hardware and software systems and applications. It is an es...
Marc Geilen