Sciweavers

1845 search results - page 270 / 369
» Operating System Performance in Support of Real-Time Middlew...
Sort
View
HPCA
1996
IEEE
15 years 7 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
USENIX
2007
15 years 5 months ago
A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection
Random peer selection is used by numerous P2P applications; examples include application-level multicast, unstructured file sharing, and network location mapping. In most of thes...
Vivek Vishnumurthy, Paul Francis
CASES
2005
ACM
15 years 5 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
OSDI
2000
ACM
15 years 4 months ago
Taming the Memory Hogs: Using Compiler-Inserted Releases to Manage Physical Memory Intelligently
Out-of-core applications consume physical resources at a rapid rate, causing interactive applications sharing the same machine to exhibit poor response times. This behavior is the...
Angela Demke Brown, Todd C. Mowry
VLUDS
2010
158views Visualization» more  VLUDS 2010»
14 years 10 months ago
Cartography of Mars in a Virtual Reality Environment
This work aims to investigate the suitability of applying Virtual Reality techniques in the exploration of Mars terrain features in order to support the creation of topographic ma...
Rolf Westerteiger