Sciweavers

559 search results - page 90 / 112
» Memory System Support for Irregular Applications
Sort
View
LCTRTS
2001
Springer
14 years 1 days ago
Evaluating and Optimizing Thread Pool Strategies for Real-Time CORBA
Strict control over the scheduling and execution of processor resources is essential for many fixed-priority real-time applications. To facilitate this common requirement, the Re...
Irfan Pyarali, Marina Spivak, Ron Cytron, Douglas ...
ICDE
1995
IEEE
101views Database» more  ICDE 1995»
14 years 9 months ago
Two-Level Caching of Composite Object Views of Relational Databases
We describe a two-level client-side cache for composite objects mapped as views of a relational database. A semantic model, the Structural Model, is used to specify joins on the r...
Catherine Hamon, Arthur M. Keller
SIGMOD
2000
ACM
133views Database» more  SIGMOD 2000»
13 years 12 months ago
Data Mining on an OLTP System (Nearly) for Free
This paper proposes a scheme for scheduling disk requests that takes advantage of the ability of high-level functions to operate directly at individual disk drives. We show that s...
Erik Riedel, Christos Faloutsos, Gregory R. Ganger...
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 6 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
CASES
2003
ACM
14 years 26 days ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...