Results 1 - 10
of
1,798
Memory Segmentation to Support Secure Applications
"... Abstract. Current CPU architectures provide only weak support for software segmentation, a key underpinning for software security techniques such as sandboxing, managed languages, and static analysis. Because hardware ..."
Abstract
- Add to MetaCart
Abstract. Current CPU architectures provide only weak support for software segmentation, a key underpinning for software security techniques such as sandboxing, managed languages, and static analysis. Because hardware
New Fortran Features: The Portable Use of Shared Memory Segments
"... Abstract The latest version of the Fortran standard, Fortran 2003, introduces many new features. While full compilers are not yet available, many have now implemented one of the most important new features, a portable method for Fortran to interoperate with C. This allows access from Fortran to man ..."
Abstract
- Add to MetaCart
to many features of the OS that were previously the domain of the systems programmer. In this report I show how shared memory segments and semaphores can be used to both enable HPC applications to solve bigger problems and to solve those problems more quickly. I illustrate these points with an example
CONVERSION: Multi-Version Concurrency Control for Main Memory Segments
"... We present CONVERSION, a multi-version concurrency control system for main memory segments. Like the familiar Subversion version control system for files, CONVERSION provides isolation between processes that each operate on their own working copy. A process retrieves and merges any changes committed ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
We present CONVERSION, a multi-version concurrency control system for main memory segments. Like the familiar Subversion version control system for files, CONVERSION provides isolation between processes that each operate on their own working copy. A process retrieves and merges any changes
The role of strong syllables in segmentation for lexical access
- Journal of Experimental Psychology: Human Perception and Performance
, 1988
"... A model of speech segmentation in a stress language is proposed, according to which the occurrence of a strong syllable triggers segmentation of the speech signal, whereas occurrence of a weak syllable does not trigger segmentation. We report experiments in which listeners detected words embedded in ..."
Abstract
-
Cited by 250 (29 self)
- Add to MetaCart
A model of speech segmentation in a stress language is proposed, according to which the occurrence of a strong syllable triggers segmentation of the speech signal, whereas occurrence of a weak syllable does not trigger segmentation. We report experiments in which listeners detected words embedded
Memory System Characterization of Commercial Workloads
- In Proceedings of the 25th annual international symposium on Computer architecture
, 1998
"... Commercial applications such as databases and Web servers constitute the largest and fastest-growing segment of the market for multiprocessor servers. Ongoing innovations in disk subsystems, along with the ever increasing gap between processor and memory speeds, have elevated memory system design as ..."
Abstract
-
Cited by 253 (5 self)
- Add to MetaCart
Commercial applications such as databases and Web servers constitute the largest and fastest-growing segment of the market for multiprocessor servers. Ongoing innovations in disk subsystems, along with the ever increasing gap between processor and memory speeds, have elevated memory system design
Deep Packet Inspection Using Parallel Bloom Filters
, 2004
"... this memory core, five random-memory locations are readable in a single clock cycle. So performing 35 concurrent memory operations requires seven parallel memory cores, each with one-seventh of the required array size, as Figure 5b illustrates. Because the basic Bloom filter allows any hash function ..."
Abstract
-
Cited by 224 (18 self)
- Add to MetaCart
function to map to any bit in the vector, it is possible that for some member, more than five hash functions map to the same memory segment, thereby exceeding the lookup capacity of this memory core. We can solve this problem by restricting the range of each hash function to a given memory, preventing
Measurement and modeling of the temporal dependence in packet loss
, 1999
"... Abstract — Understanding and modelling packet loss in the Internet is especially relevant for the design and analysis of delay-sensitive multimedia applications. In this paper, we present analysis of ¢¡¤ £ hours of endto-end unicast and multicast packet loss measurement. From these we selected ¥§ ¦ ..."
Abstract
-
Cited by 270 (11 self)
- Add to MetaCart
chain model of order ¡ or greater was found to be necessary to accurately model the rest of the segments. For the case of adaptive applications which track loss, we address two issues of on-line loss estimation: the required memory size and whether to use exponential smoothing or a sliding window
Mondrian Memory Protection
, 2002
"... Mondrian memory protection (MMP) is a fine-grained protection scheme that allows multiple protection domains to flexibly share memory and export protected services. In contrast to earlier pagebased systems, MMP allows arbitrary permissions control at the granularity of individual words. We use a com ..."
Abstract
-
Cited by 124 (3 self)
- Add to MetaCart
memory references to the accesses made by the application. Although it can be layered on top of demandpaged virtual memory, MMP is also well-suited to embedded systems with a single physical address space. We extend MMP to support segment translation which allows a memory segment to appear at another
SLIC Superpixels Compared to State-of-the-Art Superpixel Methods
- PAMI
"... Abstract—Computer vision applications have come to rely increasingly on superpixels in recent years, but it is not always clear what constitutes a good superpixel algorithm. In an effort to understand the benefits and drawbacks of existing methods, we empirically compare five state-of-the-art superp ..."
Abstract
-
Cited by 222 (3 self)
- Add to MetaCart
-of-the-art superpixel algorithms for their ability to adhere to image boundaries, speed, memory efficiency, and their impact on segmentation performance. We then introduce a new superpixel algorithm, simple linear iterative clustering (SLIC), which adapts a k-means clustering approach to efficiently generate
Results 1 - 10
of
1,798