Sciweavers

3202 search results - page 420 / 641
» Memory access scheduling
Sort
View
SIGMETRICS
2000
ACM
153views Hardware» more  SIGMETRICS 2000»
14 years 19 days ago
Measurement and analysis of LDAP performance
The Lightweight Directory Access Protocol (LDAP) is being used for an increasing number of distributed directory applications. We describe a tool to analyze the performance of LDA...
Xin Wang, Henning Schulzrinne, Dilip D. Kandlur, D...
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
14 years 12 days ago
Impact of Sharing-Based Thread Placement on Multithreaded Architectures
Multithreaded architectures context switch between instruction streams to hide memory access latency. Although this improves processor utilization, it can increase cache interfere...
Radhika Thekkath, Susan J. Eggers
VLDB
1990
ACM
100views Database» more  VLDB 1990»
14 years 9 days ago
The C-based Database Programming Language Jasmine/C
Jasmine/C is a C-based database proqramninq language that allows the handling of persistent objects in Jasmine databases. The language is used to write methods for objects and app...
Masaaki Aoshima, Yoshio Izumida, Akifumi Makinouch...
CHI
2010
ACM
14 years 9 days ago
FM radio: family interplay with sonic mementos
Digital mementos are increasingly problematic, as people acquire large amounts of digital belongings that are hard to access and often forgotten. Based on fieldwork with 10 famili...
Daniela Petrelli, Nicolas Villar, Vaiva Kalnikait&...
DASFAA
2010
IEEE
213views Database» more  DASFAA 2010»
13 years 11 months ago
Efficient Algorithms to Monitor Continuous Constrained k Nearest Neighbor Queries
Abstract. Continuous monitoring of spatial queries has received significant research attention in the past few years. In this paper, we propose two efficient algorithms for the con...
Mahady Hasan, Muhammad Aamir Cheema, Wenyu Qu, Xue...