Sciweavers

3893 search results - page 666 / 779
» Execution Architectures and Compilation
Sort
View
SIGMOD
2004
ACM
122views Database» more  SIGMOD 2004»
16 years 1 months ago
Adapting to Source Properties in Processing Data Integration Queries
An effective query optimizer finds a query plan that exploits the characteristics of the source data. In data integration, little is known in advance about sources' propertie...
Zachary G. Ives, Alon Y. Halevy, Daniel S. Weld
121
Voted
EDBT
2008
ACM
130views Database» more  EDBT 2008»
16 years 1 months ago
Flexible Transaction Processing in the Argos Middleware
Transactional requirements, from new application domains and execution environments, are varying and may exceed traditional ACID properties. We believe that transactional middlewa...
Anna-Brith Arntsen, Marts Mortensen, Randi Karlsen...
PERCOM
2008
ACM
16 years 1 months ago
Estimating the Energy Consumption in Pervasive Java-Based Systems
We define and evaluate a framework for estimating the energy consumption of pervasive Java-based software systems. The framework's primary objective is to enable an engineer ...
Chiyoung Seo, Sam Malek, Nenad Medvidovic
ICCAD
2005
IEEE
131views Hardware» more  ICCAD 2005»
15 years 10 months ago
Code restructuring for improving cache performance of MPSoCs
— One of the critical goals in code optimization for MPSoC architectures is to minimize the number of off-chip memory accesses. This is because such accesses can be extremely cos...
Guilin Chen, Mahmut T. Kandemir
SOSP
2003
ACM
15 years 10 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz