Sciweavers

1234 search results - page 206 / 247
» Privacy-preserving Virtual Machine
Sort
View
122
Voted
VLDB
1992
ACM
140views Database» more  VLDB 1992»
15 years 7 months ago
Practical Skew Handling in Parallel Joins
We present an approach to dealing with skew in parallel joins in database systems. Our approach is easily implementable within current parallel DBMS, and performs well on skewed d...
David J. DeWitt, Jeffrey F. Naughton, Donovan A. S...
126
Voted
IWMM
2010
Springer
137views Hardware» more  IWMM 2010»
15 years 7 months ago
The locality of concurrent write barriers
Concurrent and incremental collectors require barriers to ensure correct synchronisation between mutator and collector. The overheads imposed by particular barriers on particular ...
Laurence Hellyer, Richard Jones, Antony L. Hosking
136
Voted
ICDCS
2010
IEEE
15 years 7 months ago
A New Buffer Cache Design Exploiting Both Temporal and Content Localities
: This paper presents a Least Popularly Used buffer cache algorithm to exploit both temporal locality and content locality of I/O requests. Popular data blocks are selected as refe...
Jin Ren, Qing Yang
169
Voted
ACSC
2004
IEEE
15 years 7 months ago
Exploiting FPGA Concurrency to Enhance JVM Performance
The Java Programming Language has been praised for its platform independence and portability, but because of its slow execution speed on a software Java Virtual Machine (JVM), som...
James Parnis, Gareth Lee
142
Voted
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
15 years 7 months ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti