Sciweavers

595 search results - page 16 / 119
» Using Constraints with Memory to Implement Variable Eliminat...
Sort
View
143
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
The Variable-Increment Counting Bloom Filter
—Counting Bloom Filters (CBFs) are widely used in networking device algorithms. They implement fast set representations to support membership queries with limited error, and supp...
Ori Rottenstreich, Yossi Kanizo, Isaac Keslassy
165
Voted
ISCA
2012
IEEE
248views Hardware» more  ISCA 2012»
13 years 5 months ago
Watchdog: Hardware for safe and secure manual memory management and full memory safety
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
129
Voted
CGO
2009
IEEE
15 years 9 months ago
Reducing Memory Ordering Overheads in Software Transactional Memory
—Most research into high-performance software transactional memory (STM) assumes that transactions will run on a processor with a relatively strict memory model, such as Total St...
Michael F. Spear, Maged M. Michael, Michael L. Sco...
133
Voted
FPGA
1999
ACM
123views FPGA» more  FPGA 1999»
15 years 7 months ago
Procedural Texture Mapping on FPGAs
Procedural textures can be effectively used to enhance the visual realism of computer rendered images. Procedural textures can provide higher realism for 3-D objects than traditio...
Andy Gean Ye, David M. Lewis
136
Voted
AUSAI
2003
Springer
15 years 7 months ago
Dynamic Agent Ordering in Distributed Constraint Satisfaction Problems
The distributed constraint satisfaction problem (CSP) is a general formalisation used to represent problems in distributed multiagent systems. To deal with realistic problems, mult...
Lingzhong Zhou, John Thornton, Abdul Sattar