Sciweavers

4330 search results - page 736 / 866
» Analyzing security architectures
Sort
View
HPCA
2004
IEEE
16 years 4 months ago
Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses
Using alternative cache indexing/hashing functions is a popular technique to reduce conflict misses by achieving a more uniform cache access distribution across the sets in the ca...
Mazen Kharbutli, Keith Irwin, Yan Solihin, Jaejin ...
143
Voted
HPCA
2001
IEEE
16 years 4 months ago
Reevaluating Online Superpage Promotion with Hardware Support
fipical translation lookaside buffers (TLBs)can map a far smaller region of memory than application footprints demand, and the cost of handling TLB misses therefore limits the per...
Zhen Fang, Lixin Zhang, John B. Carter, Wilson C. ...
SIGMOD
2005
ACM
138views Database» more  SIGMOD 2005»
16 years 4 months ago
Automatic Physical Database Tuning: A Relaxation-based Approach
In recent years there has been considerable research on automated selection of physical design in database systems. In current solutions, candidate access paths are heuristically ...
Nicolas Bruno, Surajit Chaudhuri
ICIAP
2007
ACM
16 years 4 months ago
Generalization in Holistic versus Analytic Processing of Faces
The distinction between holistic and analytical (or feature-based) approaches to face recognition is widely held to be an important dimension of face recognition research. Holisti...
Manuele Bicego, Albert Ali Salah, Enrico Grosso, M...
ICCD
2008
IEEE
159views Hardware» more  ICCD 2008»
16 years 24 days ago
Optimizing data sharing and address translation for the Cell BE Heterogeneous Chip Multiprocessor
— Heterogeneous Chip Multiprocessors (HMPs), such as the Cell Broadband Engine, offer a new design optimization opportunity by allowing designers to provide accelerators for appl...
Michael Gschwind