Sciweavers

559 search results - page 90 / 112
» Memory System Support for Irregular Applications
Sort
View
LCTRTS
2001
Springer
15 years 6 months ago
Evaluating and Optimizing Thread Pool Strategies for Real-Time CORBA
Strict control over the scheduling and execution of processor resources is essential for many fixed-priority real-time applications. To facilitate this common requirement, the Re...
Irfan Pyarali, Marina Spivak, Ron Cytron, Douglas ...
ICDE
1995
IEEE
101views Database» more  ICDE 1995»
16 years 3 months ago
Two-Level Caching of Composite Object Views of Relational Databases
We describe a two-level client-side cache for composite objects mapped as views of a relational database. A semantic model, the Structural Model, is used to specify joins on the r...
Catherine Hamon, Arthur M. Keller
SIGMOD
2000
ACM
133views Database» more  SIGMOD 2000»
15 years 6 months ago
Data Mining on an OLTP System (Nearly) for Free
This paper proposes a scheme for scheduling disk requests that takes advantage of the ability of high-level functions to operate directly at individual disk drives. We show that s...
Erik Riedel, Christos Faloutsos, Gregory R. Ganger...
SIGOPS
2010
162views more  SIGOPS 2010»
15 years 8 days ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
CASES
2003
ACM
15 years 7 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...