Sciweavers

3202 search results - page 466 / 641
» Memory access scheduling
Sort
View
ICALP
2010
Springer
15 years 7 months ago
Streaming Algorithms for Independent Sets
We find “combinatorially optimal” (guaranteed by the degree-sequence alone) independent sets for graphs and hypergraps in linear space in the semi-streaming model. We also pr...
Bjarni V. Halldórsson, Magnús M. Hal...
120
Voted
ISCA
1999
IEEE
90views Hardware» more  ISCA 1999»
15 years 7 months ago
Effective Jump-Pointer Prefetching for Linked Data Structures
Current techniques for prefetching linked data structures (LDS) exploit the work available in one loop iteration or recursive call to overlap pointer chasing latency. Jumppointers...
Amir Roth, Gurindar S. Sohi
ECOOP
1999
Springer
15 years 7 months ago
Providing Persistent Objects in Distributed Systems
THOR is a persistent object store that provides a powerful programming model. THOR ensures that persistent objects are accessed only by calling their methods and it supports atomic...
Barbara Liskov, Miguel Castro, Liuba Shrira, Atul ...
129
Voted
VTS
1999
IEEE
125views Hardware» more  VTS 1999»
15 years 7 months ago
Error Detecting Refreshment for Embedded DRAMs
This paper presents a new technique for on-line consistency checking of embedded DRAMs. The basic idea is to use the periodic refresh operation for concurrently computing a test c...
Sybille Hellebrand, Hans-Joachim Wunderlich, Alexa...
127
Voted
ICS
1999
Tsinghua U.
15 years 7 months ago
Adapting cache line size to application behavior
A cache line size has a signi cant e ect on missrate and memorytra c. Today's computers use a xed line size, typically 32B, which may not be optimalfor a given application. O...
Alexander V. Veidenbaum, Weiyu Tang, Rajesh K. Gup...