Sciweavers

338 search results - page 54 / 68
» Second Generation Benchmarking and Application Oriented Eval...
Sort
View
GCC
2007
Springer
15 years 6 months ago
Data Persistence in Structured P2P Networks with Redundancy Schemes
Data service is the principle application in structured P2P networks. And in many cases, we need the data to persist for a long time. So how to persist the data service and how lo...
Hongxing Li, Guihai Chen
EUROSYS
2009
ACM
15 years 8 months ago
First-aid: surviving and preventing memory management bugs during production runs
Memory bugs in C/C++ programs severely affect system availability and security. This paper presents First-Aid, a lightweight runtime system that survives software failures caused ...
Qi Gao, Wenbin Zhang, Yan Tang, Feng Qin
CGO
2008
IEEE
15 years 6 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss
DAC
2006
ACM
15 years 5 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
DATAMINE
1999
152views more  DATAMINE 1999»
14 years 11 months ago
Discovery of Frequent DATALOG Patterns
Discovery of frequent patterns has been studied in a variety of data mining settings. In its simplest form, known from association rule mining, the task is to discover all frequent...
Luc Dehaspe, Hannu Toivonen