Sciweavers

2512 search results - page 119 / 503
» Software Transactional Memory
Sort
View
WOSP
1998
ACM
14 years 2 months ago
Predicting memory use from a class diagram using dynamic information
Increasingly, new applications are being built by composing existing software components rather than by coding a system from scratch. Using this approach, applications can be buil...
Gail C. Murphy, Ekaterina Saenko
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
14 years 3 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
ECIS
2001
13 years 11 months ago
A Review of the Issues Associated with Customer Relationship Management Systems
Customer Relationship Management (CRM) standard package software has become a key contributor to attempts at aligning business and IT strategies in recent years. The past decade h...
Ben Light
IEEEPACT
2003
IEEE
14 years 3 months ago
Using Software Logging to Support Multi-Version Buffering in Thread-Level Speculation
In Thread-Level Speculation (TLS), speculative tasks generate memory state that cannot simply be combined with the rest of the system because it is unsafe. One way to deal with th...
María Jesús Garzarán, Milos P...
FPL
2006
Springer
120views Hardware» more  FPL 2006»
14 years 2 months ago
Regular Expression Software Deceleration for Intrusion Detection Systems
The use of reconfigurable hardware for network security applications has recently made great strides as FPGA devices have provided larger and faster resources. Regular expressions...
Zachary K. Baker, Viktor K. Prasanna, Hong-Jip Jun...