Sciweavers

211 search results - page 37 / 43
» Implementing and Exploiting Inevitability in Software Transa...
Sort
View
SIGCSE
1999
ACM
193views Education» more  SIGCSE 1999»
14 years 26 days ago
Cache conscious programming in undergraduate computer science
The wide-spread use of microprocessor based systems that utilize cache memory to alleviate excessively long DRAM access times introduces a new dimension in the quest to obtain goo...
Alvin R. Lebeck
SSDBM
2010
IEEE
248views Database» more  SSDBM 2010»
14 years 1 months ago
Client + Cloud: Evaluating Seamless Architectures for Visual Data Analytics in the Ocean Sciences
Science is becoming data-intensive, requiring new software architectures that can exploit resources at all scales: local GPUs for interactive visualization, server-side multi-core ...
Keith Grochow, Bill Howe, Mark Stoermer, Roger S. ...
DIMVA
2008
13 years 9 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
LCTRTS
2005
Springer
14 years 2 months ago
System-wide compaction and specialization of the linux kernel
The limited built-in configurability of Linux can lead to expensive code size overhead when it is used in the embedded market. To overcome this problem, we propose the applicatio...
Dominique Chanet, Bjorn De Sutter, Bruno De Bus, L...
ICASSP
2011
IEEE
13 years 8 days ago
Stretching, compression and shearing disparity compensated prediction techniques for stereo and multiview video coding
- In multiview video coding, disparity compensated prediction exploits the correlation among different views. A common approach is to use the conventional motion compensated predic...
Ka-Man Wong, Lai-Man Po, Kwok-Wai Cheung, Ka-Ho Ng...