Sciweavers

2634 search results - page 480 / 527
» Faster Than Uppaal
Sort
View
ISLPED
2005
ACM
122views Hardware» more  ISLPED 2005»
14 years 3 months ago
A simple mechanism to adapt leakage-control policies to temperature
Leakage power reduction in cache memories continues to be a critical area of research because of the promise of a significant pay-off. Various techniques have been developed so fa...
Stefanos Kaxiras, Polychronis Xekalakis, Georgios ...
SIGCOMM
2005
ACM
14 years 3 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
SIGMETRICS
2005
ACM
14 years 3 months ago
End-to-end estimation of the available bandwidth variation range
The available bandwidth (avail-bw) of a network path is an important performance metric and its end-to-end estimation has recently received significant attention. Previous work f...
Manish Jain, Constantinos Dovrolis
VEE
2005
ACM
218views Virtualization» more  VEE 2005»
14 years 3 months ago
The pauseless GC algorithm
Modern transactional response-time sensitive applications have run into practical limits on the size of garbage collected heaps. The heap can only grow until GC pauses exceed the ...
Cliff Click, Gil Tene, Michael Wolf
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...