Sciweavers

1194 search results - page 190 / 239
» Virtualization of Hardware - Introduction and Survey
Sort
View
VRCAI
2004
ACM
15 years 5 months ago
A novel approach to extract triangle strips for iso-surfaces in volumes
The Marching Cubes (MC) algorithm is a popular approach to extract iso-surfaces from volumetric data. This approach extracts triangles from the volume data for a specific iso-valu...
Jagannathan Lakshmipathy, Wieslaw L. Nowinski, Eri...
CASCON
2004
127views Education» more  CASCON 2004»
15 years 1 months ago
A quantitative analysis of the performance impact of specialized bytecodes in java
Java is implemented by 201 bytecodes that serve the same purpose as assembler instructions while providing object-file platform independence. A collection of core bytecodes provid...
Ben Stephenson, Wade Holst
SCP
2008
128views more  SCP 2008»
14 years 11 months ago
Mobile JikesRVM: A framework to support transparent Java thread migration
Today's complex applications must face the distribution of data and code among different network nodes. Computation in distributed contexts is demanding increasingly powerful...
Raffaele Quitadamo, Giacomo Cabri, Letizia Leonard...
ISCA
2009
IEEE
148views Hardware» more  ISCA 2009»
15 years 6 months ago
Disaggregated memory for expansion and sharing in blade servers
Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contribut...
Kevin T. Lim, Jichuan Chang, Trevor N. Mudge, Part...
ICNP
2006
IEEE
15 years 5 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...