Sciweavers

360 search results - page 67 / 72
» Speculative Computation in Multilisp
Sort
View
JCP
2007
127views more  JCP 2007»
13 years 7 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
CGA
2005
13 years 7 months ago
Visualizing Live Text Streams Using Motion and Temporal Pooling
In today's fast-paced world, it is increasingly difficult to understand and act promptly upon the content of the many information streams available. Temporal pooling addresse...
Conrad Albrecht-Buehler, Benjamin Watson, David A....
EUROPAR
1999
Springer
13 years 11 months ago
Multi-stage Cascaded Prediction
Two-level predictors deliver highly accurate conditional branch prediction, indirect branch target prediction and value prediction. Accurate prediction enables speculative executio...
Karel Driesen, Urs Hölzle
ICS
1999
Tsinghua U.
13 years 11 months ago
Reorganizing global schedules for register allocation
Instruction scheduling is an important compiler technique for exploiting more instruction-level parallelism (ILP) in high-performance microprocessors, and in this paper, we study ...
Gang Chen, Michael D. Smith
ICS
1999
Tsinghua U.
13 years 11 months ago
Classifying load and store instructions for memory renaming
Memory operations remain a significant bottleneck in dynamically scheduled pipelined processors, due in part to the inability to statically determine the existence of memory addr...
Glenn Reinman, Brad Calder, Dean M. Tullsen, Gary ...