Sciweavers

111 search results - page 4 / 23
» Work Stealing Technique and Scheduling on the Critical Path
Sort
View
DAC
2007
ACM
15 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
FPL
2009
Springer
135views Hardware» more  FPL 2009»
15 years 2 months ago
Fast critical sections via thread scheduling for FPGA-based multithreaded processors
As FPGA-based systems including soft processors become increasingly common, we are motivated to better understand the architectural trade-offs and improve the efficiency of these...
Martin Labrecque, J. Gregory Steffan
WSC
2007
15 years 4 days ago
Flexible modeling of linear schedules for integrated mathematical analysis
Developing and analyzing schedules is essential for successfully controlling the time aspect of construction projects. The critical path method of scheduling is by far the most wi...
Gunnar Lucko
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
15 years 4 months ago
Matrix scheduler reloaded
From multiprocessor scale-up to cache sizes to the number of reorder-buffer entries, microarchitects wish to reap the benefits of more computing resources while staying within po...
Peter G. Sassone, Jeff Rupley, Edward Brekelbaum, ...
WORDS
2003
IEEE
15 years 3 months ago
Application QoS-Based Time-Critical Automated Resource Management in Battle Management Systems
This paper summarizes some of our unclassified work on concepts and techniques for performing automated runtime time-critical resource management (especially scheduling) in large ...
E. Douglas Jensen