Sciweavers

1816 search results - page 142 / 364
» Trace oblivious computation
Sort
View
NPC
2010
Springer
13 years 8 months ago
Differentiated Replication Strategy in Data Centers
Cloud computing has attracted a great deal of attention in both academia and industry. We envision the provision of differentiated services as being one of the key components to th...
Tung Nguyen, Anthony Cutway, Weisong Shi
COCO
2009
Springer
78views Algorithms» more  COCO 2009»
14 years 4 months ago
Fixed-Polynomial Size Circuit Bounds
—In 1982, Kannan showed that ΣP 2 does not have nk -sized circuits for any k. Do smaller classes also admit such circuit lower bounds? Despite several improvements of Kannan’s...
Lance Fortnow, Rahul Santhanam, Ryan Williams
LCPC
2007
Springer
14 years 4 months ago
Modeling Relations between Inputs and Dynamic Behavior for General Programs
Program dynamic optimization, adaptive to runtime behavior changes, has become increasingly important for both performance and energy savings. However, most runtime optimizations o...
Xipeng Shen, Feng Mao
P2P
2005
IEEE
189views Communications» more  P2P 2005»
14 years 3 months ago
Proximity Neighbor Selection for a DHT in Wireless Multi-Hop Networks
A mobile ad hoc network (MANET) is a multi-hop wireless network having no infrastructure. Thus, the mobile nodes have to perform basic control tasks, such as routing, and higher-l...
Curt Cramer, Thomas Fuhrmann
ISCA
2010
IEEE
205views Hardware» more  ISCA 2010»
14 years 3 months ago
The virtual write queue: coordinating DRAM and last-level cache policies
In computer architecture, caches have primarily been viewed as a means to hide memory latency from the CPU. Cache policies have focused on anticipating the CPU’s data needs, and...
Jeffrey Stuecheli, Dimitris Kaseridis, David Daly,...