Sciweavers

1406 search results - page 98 / 282
» Software trace cache
Sort
View
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
MICRO
2005
IEEE
125views Hardware» more  MICRO 2005»
14 years 3 months ago
Improving Region Selection in Dynamic Optimization Systems
The performance of a dynamic optimization system depends heavily on the code it selects to optimize. Many current systems follow the design of HP Dynamo and select a single interp...
David Hiniker, Kim M. Hazelwood, Michael D. Smith
CODES
2003
IEEE
14 years 3 months ago
Tracking object life cycle for leakage energy optimization
The focus of this work is on utilizing the state of objects during their lifespan in optimizing the leakage energy consumed in the data caches when executing embedded Java applica...
Guangyu Chen, Narayanan Vijaykrishnan, Mahmut T. K...
ICSE
2007
IEEE-ACM
14 years 10 months ago
Predicting Faults from Cached History
We analyze the version history of 7 software systems to predict the most fault prone entities and files. The basic assumption is that faults do not occur in isolation, but rather ...
Sunghun Kim, Thomas Zimmermann, E. James Whitehead...
WSCG
2004
136views more  WSCG 2004»
13 years 11 months ago
Light Vectors for a Moving Observer
Interactive rendering is usually made with very simple illumination models. High quality rendering is too slow to be interactive. In this paper, we extend the notion of light vect...
Rodolphe Crespin, Bernard Péroche