Sciweavers

295 search results - page 38 / 59
» Comparing Benchmarks Using Key Microarchitecture-Independent...
Sort
View
BMCBI
2007
135views more  BMCBI 2007»
13 years 7 months ago
Automatic extraction of reliable regions from multiple sequence alignments
Background: High quality multiple alignments are crucial in the transfer of annotation from one genome to another. Multiple alignment methods strive to achieve ever increasing lev...
Timo Lassmann, Erik L. L. Sonnhammer
TCAD
2008
114views more  TCAD 2008»
13 years 7 months ago
Three-Dimensional Chip-Multiprocessor Run-Time Thermal Management
Three-dimensional integration has the potential to improve the communication latency and integration density of chip-level multiprocessors (CMPs). However, the stacked highpower de...
Changyun Zhu, Zhenyu (Peter) Gu, Li Shang, Robert ...
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
14 years 9 months ago
Accurate and Efficient Inter-Transaction Dependency Tracking
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
Tzi-cker Chiueh, Shweta Bajpai
CGO
2009
IEEE
14 years 2 months ago
OptiScope: Performance Accountability for Optimizing Compilers
Compilers employ many aggressive code transformations to achieve highly optimized code. However, because of complex target architectures and unpredictable optimization interaction...
Tipp Moseley, Dirk Grunwald, Ramesh Peri
ACSAC
2008
IEEE
14 years 2 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...