Sciweavers

3202 search results - page 186 / 641
» Memory access scheduling
Sort
View
CF
2010
ACM
15 years 10 months ago
On-chip communication and synchronization mechanisms with cache-integrated network interfaces
Per-core local (scratchpad) memories allow direct inter-core communication, with latency and energy advantages over coherent cache-based communication, especially as CMP architect...
Stamatis G. Kavadias, Manolis Katevenis, Michail Z...
EMSOFT
2009
Springer
15 years 11 months ago
Probabilistic modeling of data cache behavior
In this paper, we propose a formal analysis approach to estimate the expected (average) data cache access time of an application across all possible program inputs. Towards this g...
Vinayak Puranik, Tulika Mitra, Y. N. Srikant
165
Voted
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
MTA
2007
113views more  MTA 2007»
15 years 4 months ago
Throughput optimization for video streaming proxy servers based on video staging
A video streaming proxy server needs to handle hundreds of simultaneous connections between media servers and clients. Inside, every video arrived at the server and delivered from ...
Wai Kong Cheuk, Daniel Pak-Kong Lun
RTSS
1992
IEEE
15 years 9 months ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay