Sciweavers

13631 search results - page 2625 / 2727
» Event-Based Performance Analysis
Sort
View
PLDI
1994
ACM
15 years 6 months ago
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses
As microprocessor speeds increase, memory bandwidth is increasing y the performance bottleneck for microprocessors. This has occurred because innovation and technological improvem...
Jack W. Davidson, Sanjay Jinturkar
SIGGRAPH
1993
ACM
15 years 6 months ago
Radioptimization: goal based rendering
This paper presents a method for designing the illumination in an environment using optimization techniques applied to a radiosity based image synthesis system. An optimization of...
John K. Kawai, James S. Painter, Michael F. Cohen
SIGMOD
1993
ACM
163views Database» more  SIGMOD 1993»
15 years 6 months ago
The LRU-K Page Replacement Algorithm For Database Disk Buffering
This paper introduces a new approach to database disk buffering, called the LRU–K method. The basic idea of LRU–K is to keep track of the times of the last K references to pop...
Elizabeth J. O'Neil, Patrick E. O'Neil, Gerhard We...
SMA
1993
ACM
124views Solid Modeling» more  SMA 1993»
15 years 6 months ago
Intelligent form feature interaction management in a cellular modeling scheme
Form features present a rather attractive building block in computer-aided design environments for a variety of applications, providing the embodiment of engineering semantics in ...
Rafael Bidarra, José Carlos Teixeira
ACSAC
2007
IEEE
15 years 6 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
« Prev « First page 2625 / 2727 Last » Next »