Sciweavers

402 search results - page 55 / 81
» Understanding transactional memory performance
Sort
View
105
Voted
ADC
2008
Springer
156views Database» more  ADC 2008»
15 years 3 months ago
Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream
Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
Ming-Yen Lin, Sue-Chen Hsueh, Sheng-Kun Hwang
RULEML
2010
Springer
14 years 7 months ago
A Contract Agreement Policy-Based Workflow Methodology for Agents Interacting in the Semantic Web
The Semantic Web aims at automating Web content understanding and user request satisfaction. Intelligent agents assist towards this by performing complex actions on behalf of their...
Kalliopi Kravari, Grammati-Eirini Kastori, Nick Ba...
USENIX
2001
14 years 10 months ago
Page Replacement in Linux 2.4 Memory Management
While the virtual memory management in Linux 2.2 has decent performance for many workloads, it suffers from a number of problems. The first part of this paper contains a descripti...
Rik van Riel
ICSE
2008
IEEE-ACM
15 years 10 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
80
Voted
USENIX
2007
14 years 11 months ago
A Memory Soft Error Measurement on Production Systems
Memory state can be corrupted by the impact of particles causing single-event upsets (SEUs). Understanding and dealing with these soft (or transient) errors is important for syste...
Xin Li, Kai Shen, Michael C. Huang, Lingkun Chu