Sciweavers

4330 search results - page 762 / 866
» Analyzing security architectures
Sort
View
ISCA
2002
IEEE
127views Hardware» more  ISCA 2002»
15 years 8 months ago
The Optimum Pipeline Depth for a Microprocessor
The impact of pipeline length on the performance of a microprocessor is explored both theoretically and by simulation. An analytical theory is presented that shows two opposing ar...
Allan Hartstein, Thomas R. Puzak
145
Voted
MSE
2002
IEEE
135views Hardware» more  MSE 2002»
15 years 8 months ago
The Impact of SMT/SMP Designs on Multimedia Software Engineering - A Workload Analysis Study
This paper presents the study of running several core multimedia applications on a simultaneous multithreading (SMT) architecture and derives design principles for multimedia soft...
Yen-Kuang Chen, Rainer Lienhart, Eric Debes, Matth...
103
Voted
VTS
2002
IEEE
106views Hardware» more  VTS 2002»
15 years 8 months ago
How Effective are Compression Codes for Reducing Test Data Volume?
Run-length codes and their variants have recently been shown to be very effective for compressing system-on-achip (SOC) test data. In this paper, we analyze the Golomb code, the c...
Anshuman Chandra, Krishnendu Chakrabarty, Rafael A...
131
Voted
SIGMOD
2010
ACM
321views Database» more  SIGMOD 2010»
15 years 8 months ago
HadoopDB in action: building real world applications
HadoopDB is a hybrid of MapReduce and DBMS technologies, designed to meet the growing demand of analyzing massive datasets on very large clusters of machines. Our previous work ha...
Azza Abouzied, Kamil Bajda-Pawlikowski, Jiewen Hua...
138
Voted
CF
2009
ACM
15 years 8 months ago
Data parallel acceleration of decision support queries using Cell/BE and GPUs
Decision Support System (DSS) workloads are known to be one of the most time-consuming database workloads that processes large data sets. Traditionally, DSS queries have been acce...
Pedro Trancoso, Despo Othonos, Artemakis Artemiou