Sciweavers

10210 search results - page 150 / 2042
» Configuring Database Systems
Sort
View
DATE
2004
IEEE
147views Hardware» more  DATE 2004»
14 years 2 months ago
Automatic Tuning of Two-Level Caches to Embedded Applications
The power consumed by the memory hierarchy of a microprocessor can contribute to as much as 50% of the total microprocessor system power, and is thus a good candidate for optimiza...
Ann Gordon-Ross, Frank Vahid, Nikil Dutt
LCPC
2000
Springer
14 years 1 months ago
Optimizing the Use of High Performance Software Libraries
Abstract. This paper describes how the use of software libraries, which is prevalent in high performance computing, can benefit from compiler optimizations in much the same way tha...
Samuel Z. Guyer, Calvin Lin
CNIS
2006
13 years 11 months ago
Design of a virtual computer security lab
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...
Jörg Keller, Ralf Naues
MVA
1992
13 years 11 months ago
Contour Map Reconstruction via Multi-Module Parallel Computational Scheme
Module-1 :Computation of gradient directions. Reconstruction of a set of imperfect contour curves which is extracted :Assignment of discreteheight to contourcurves. from a topograp...
Miyuki Kawashima, Ryuji Tokunaga, Yuzo Hirai
CN
2006
106views more  CN 2006»
13 years 10 months ago
Efficient large-scale BGP simulations
Simulation has been the method of choice for analyzing large, complex, and highly volatile systems. One of these systems is the inter-domain routing infrastructure of the Internet...
Xenofontas A. Dimitropoulos, George F. Riley