Sciweavers

120 search results - page 14 / 24
» Polyhedral Modeling and Analysis of Memory Access Profiles
Sort
View
EMSOFT
2006
Springer
15 years 1 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
FAST
2010
15 years 21 hour ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
81
Voted
EDBT
2004
ACM
230views Database» more  EDBT 2004»
15 years 9 months ago
Flexible Integration of Molecular-Biological Annotation Data: The GenMapper Approach
Molecular-biological annotation data is continuously being collected, curated and made accessible in numerous public data sources. Integration of this data is a major challenge in ...
Hong Hai Do, Erhard Rahm
CSMR
1999
IEEE
15 years 2 months ago
Impact of Function Pointers on the Call Graph
Maintenance activities are made more difficult when pointers are heavily used in source code: the programmer needs to build a mental model of memory locations and of the way they ...
Giuliano Antoniol, F. Calzolari, Paolo Tonella
ALMOB
2008
95views more  ALMOB 2008»
14 years 9 months ago
A stitch in time: Efficient computation of genomic DNA melting bubbles
Background: It is of biological interest to make genome-wide predictions of the locations of DNA melting bubbles using statistical mechanics models. Computationally, this poses th...
Eivind Tøstesen