Sciweavers

1147 search results - page 161 / 230
» Virtualizing Transactional Memory
Sort
View
ASPLOS
2008
ACM
15 years 3 months ago
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires adva...
Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou
ISCA
1993
IEEE
92views Hardware» more  ISCA 1993»
15 years 6 months ago
The Detection and Elimination of Useless Misses in Multiprocessors
In this paper we introduce a classification of misses in shared-memory multiprocessors based on inter processor communication. We identify the set of essential misses, i.e., the s...
Michel Dubois, Jonas Skeppstedt, Livio Ricciulli, ...
131
Voted
WOWMOM
2009
ACM
142views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization
Securing wireless communication with resourceconstrained implanted medical devices is considered. A method for refreshing symmetric encryption keys by reciprocal quantization of t...
Gill R. Tsouri
115
Voted
ANSS
2007
IEEE
15 years 8 months ago
Revisiting the Issue of Performance Enhancement of Discrete Event Simulation Software
New approaches are considered for performance enhancement of discrete-event simulation software. Instead of taking a purely algorithmic analysis view, we supplement algorithmic co...
Alex Bahouth, Steven Crites, Norman Matloff, Todd ...
130
Voted
WEA
2007
Springer
131views Algorithms» more  WEA 2007»
15 years 8 months ago
On the Cost of Persistence and Authentication in Skip Lists
We present an extensive experimental study of authenticated data structures for dictionaries and maps implemented with skip lists. We consider realizations of these data structures...
Michael T. Goodrich, Charalampos Papamanthou, Robe...