Sciweavers

177 search results - page 34 / 36
» Access Control Based on Execution History
Sort
View
GECCO
2010
Springer
170views Optimization» more  GECCO 2010»
14 years 8 days ago
Improving reliability of embedded systems through dynamic memory manager optimization using grammatical evolution
Technology scaling has offered advantages to embedded systems, such as increased performance, more available memory and reduced energy consumption. However, scaling also brings a...
José Manuel Colmenar, José L. Risco-...
ENTCS
2007
168views more  ENTCS 2007»
13 years 7 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
EUROMED
2010
13 years 4 months ago
Capture and Processing of High Resolution 3D-Data of Sutra Inscriptions in China
Modern high resolution 3D-measuring techniques are widely used in quality control and industrial production, because they allow precise and reliable inspection of objects. Their po...
Natalie Schmidt, Frank Boochs, Rainer Schütze
PPOPP
2010
ACM
14 years 2 months ago
An adaptive performance modeling tool for GPU architectures
This paper presents an analytical model to predict the performance of general-purpose applications on a GPU architecture. The model is designed to provide performance information ...
Sara S. Baghsorkhi, Matthieu Delahaye, Sanjay J. P...
ICPP
2007
IEEE
14 years 1 months ago
Integrating Memory Compression and Decompression with Coherence Protocols in Distributed Shared Memory Multiprocessors
Ever-increasing memory footprint of applications and increasing mainstream popularity of shared memory parallel computing motivate us to explore memory compression potential in di...
Lakshmana Rao Vittanala, Mainak Chaudhuri