• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,155
Next 10 →

Evaluation of Release Consistent Software Distributed Shared Memory on Emerging Network Technology

by Sandhya Dwarkadas, Pete Keleher, Alan L. Cox, Willy Zwaenepoel
"... We evaluate the effect of processor speed, network characteristics, and software overhead on the performance of release-consistent software distributed shared memory. We examine five different protocols for implementing release consistency: eager update, eager invalidate, lazy update, lazy invalidat ..."
Abstract - Cited by 467 (43 self) - Add to MetaCart
We evaluate the effect of processor speed, network characteristics, and software overhead on the performance of release-consistent software distributed shared memory. We examine five different protocols for implementing release consistency: eager update, eager invalidate, lazy update, lazy

Changes in rRNA levels during stress invalidate results from mRNA blotting: fluorescence in situ rRNA hybridization permits renormalization for estimation of cellular mRNA levels

by Martin C. Hansen, Allan K. Nielsen, Søren Molin, Mogens Kilstrup, J. Bacteriol, Martin C. Hansen, Allan K. Nielsen, Søren Molin, Karin Hammer - J Bacteriol , 2001
"... Updated information and services can be found at: ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
Updated information and services can be found at:

in

by Albert Erlebacher, Illinois I
"... The invalidity of "invalid results from the method ..."
Abstract - Add to MetaCart
The invalidity of "invalid results from the method

Cache Decay: Exploiting Generational Behavior to Reduce Cache Leakage Power

by Stefanos Kaxiras, Zhigang Hu, Margaret Martonosi - in Proceedings of the 28th International Symposium on Computer Architecture , 2001
"... Power dissipation is increasingly important in CPUs ranging from those intended for mobile use, all the way up to highperformance processors for high-end servers. While the bulk of the power dissipated is dynamic switching power, leakage power is also beginning to be a concern. Chipmakers expect tha ..."
Abstract - Cited by 280 (26 self) - Add to MetaCart
leakage. We discuss policies and implementations for reducing cache leakage by invalidating and “turning off ” cache lines when they hold data not likely to be reused. In particular, our approach is targeted at the generational nature of cache line usage. That is, cache lines typically have a flurry

Dynamic Self-Invalidation: Reducing Coherence Overhead in Shared-Memory Multiprocessors

by Alvin R. Lebeck, David A. Wood - In Proc. of the 22nd Annual Int’l Symp. on Computer Architecture (ISCA’95 , 1995
"... This paper introduces dynamic self-invalidation (DSI), a new technique for reducing cache coherence overhead in shared-memory multiprocessors. DSI eliminates invalidation messages by having a processor automatically invalidate its local copy of a cache block before a conflicting access by another pr ..."
Abstract - Cited by 112 (4 self) - Add to MetaCart
in the context of hardware directory-based write-invalidate coherence protocols. Our results show that DSI reduces execution time of a sequentially consistent full-map coherence protocol by as much as 41%. This is comparable to an implementation of weak consistency that uses a coalescing write-buffer to allow up

GÖDEL’S THEOREM IS INVALID

by Diego Saá , 2005
"... Copyright c○2000 Gödel’s results have had a great impact in diverse fields such as philosophy, computer sciences and fundamentals of mathematics. The fact that the rule of mathematical induction is contradictory with the rest of clauses used by Gödel to prove his undecidability and incompleteness th ..."
Abstract - Add to MetaCart
Copyright c○2000 Gödel’s results have had a great impact in diverse fields such as philosophy, computer sciences and fundamentals of mathematics. The fact that the rule of mathematical induction is contradictory with the rest of clauses used by Gödel to prove his undecidability and incompleteness

A Note on the Theme of Too Many Instruments

by David Roodman
"... The Difference and System generalized method of moments (GMM) estimators are growing in popularity, thanks in part to specialized software. But as implemented in these packages, the estimators easily generate results by default that are at once invalid yet appear valid in specification tests. The cu ..."
Abstract - Cited by 227 (3 self) - Add to MetaCart
The Difference and System generalized method of moments (GMM) estimators are growing in popularity, thanks in part to specialized software. But as implemented in these packages, the estimators easily generate results by default that are at once invalid yet appear valid in specification tests

On Comparing Classifiers: Pitfalls to Avoid and a Recommended Approach

by Steven L. Salzberg, Usama Fayyad - Data Mining and Knowledge Discovery , 1997
"... Abstract. An important component of many data mining projects is finding a good classification algorithm, a process that requires very careful thought about experimental design. If not done very carefully, comparative studies of classification and other types of algorithms can easily result in stati ..."
Abstract - Cited by 224 (0 self) - Add to MetaCart
Abstract. An important component of many data mining projects is finding a good classification algorithm, a process that requires very careful thought about experimental design. If not done very carefully, comparative studies of classification and other types of algorithms can easily result

A Scalable Approach to Thread-Level Speculation

by J. Gregory Steffan , Christopher B. Colohan, Antonia Zhai, Todd C. Mowry - IN PROCEEDINGS OF THE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE , 2000
"... While architects understandhow to build cost-effective parallel machines across a wide spectrum of machine sizes (ranging from within a single chip to large-scale servers), the real challenge is how to easily create parallel software to effectively exploit all of this raw performancepotential. One p ..."
Abstract - Cited by 232 (20 self) - Add to MetaCart
scales to any machine size because it is a straightforward extension of writeback invalidation-based cache coherence (which itself scales both up and down). Our experimental results demonstrate that our scheme performs well on both single-chip multiprocessors and on larger-scale machines where

Detection of invalid routing announcement in the internet

by Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu, Lixia Zhang Ý - In IEEE DSN , 2002
"... Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS, or MOAS. MOAS can be due to either operational need to support multi-homing, or false route announcements due to configur ..."
Abstract - Cited by 20 (2 self) - Add to MetaCart
route announcements from false origins. Rather than imposing cryptographybased authentication and encryption to secure routing message exchanges, our solution makes use of the rich connectivity among ASes that exists in the Internet. Simulation results show that this simple solution can effectively
Next 10 →
Results 1 - 10 of 2,155
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University