Sciweavers

13631 search results - page 2625 / 2727
» Event-Based Performance Analysis
Sort
View
PLDI
1994
ACM
13 years 12 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
SIGGRAPH
1993
ACM
13 years 12 months ago
Radioptimization: goal based rendering
This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of...
John K. Kawai, James S. Painter, Michael F. Cohen
SIGMOD
1993
ACM
163views Database» more  SIGMOD 1993»
13 years 12 months ago
The LRU-K Page Replacement Algorithm For Database Disk Buffering
This paper introduces a new approach to database disk buffering, called the LRU–K method. The basic idea of LRU–K is to keep track of the times of the last K references to pop...
Elizabeth J. O'Neil, Patrick E. O'Neil, Gerhard We...
SMA
1993
ACM
124views Solid Modeling» more  SMA 1993»
13 years 12 months ago
Intelligent form feature interaction management in a cellular modeling scheme
Form features present a rather attractive building block in computer-aided design environments for a variety of applications, providing the embodiment of engineering semantics in ...
Rafael Bidarra, José Carlos Teixeira
ACSAC
2007
IEEE
13 years 12 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
« Prev « First page 2625 / 2727 Last » Next »