Sciweavers

3202 search results - page 466 / 641
» Memory access scheduling
Sort
View
ICALP
2010
Springer
14 years 29 days ago
Streaming Algorithms for Independent Sets
We find “combinatorially optimal” (guaranteed by the degree-sequence alone) independent sets for graphs and hypergraps in linear space in the semi-streaming model. We also pr...
Bjarni V. Halldórsson, Magnús M. Hal...
ISCA
1999
IEEE
90views Hardware» more  ISCA 1999»
14 years 13 days ago
Effective Jump-Pointer Prefetching for Linked Data Structures
Current techniques for prefetching linked data structures (LDS) exploit the work available in one loop iteration or recursive call to overlap pointer chasing latency. Jumppointers...
Amir Roth, Gurindar S. Sohi
ECOOP
1999
Springer
14 years 13 days ago
Providing Persistent Objects in Distributed Systems
THOR is a persistent object store that provides a powerful programming model. THOR ensures that persistent objects are accessed only by calling their methods and it supports atomic...
Barbara Liskov, Miguel Castro, Liuba Shrira, Atul ...
VTS
1999
IEEE
125views Hardware» more  VTS 1999»
14 years 13 days ago
Error Detecting Refreshment for Embedded DRAMs
This paper presents a new technique for on-line consistency checking of embedded DRAMs. The basic idea is to use the periodic refresh operation for concurrently computing a test c...
Sybille Hellebrand, Hans-Joachim Wunderlich, Alexa...
ICS
1999
Tsinghua U.
14 years 13 days ago
Adapting cache line size to application behavior
A cache line size has a signi cant e ect on missrate and memorytra c. Today's computers use a xed line size, typically 32B, which may not be optimalfor a given application. O...
Alexander V. Veidenbaum, Weiyu Tang, Rajesh K. Gup...