• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 12,162
Next 10 →

Table 1: User-level benchmarks in seconds.

in Device-Enabled Authorization in the Grey System
by Lujo Bauer, Scott Garriss, Jonathan M. Mccune, Michael K. Reiter, Jason Rouse, Peter Rutenbar 2005
"... In PAGE 19: ...pplication is given in Section 6.1. Each timing was measured starting when the user selected the door from the resource list on her phone (a Nokia 6620), and ended when the door unlocked. As shown in Table1 , this delay was approximately six seconds excluding any user interaction (more on this below), with a small variance resulting from background work on the phone, such as alarms, housekeeping, and other applications. The second macrobenchmark is the time required for a user to log into a 2GHz Windows XP workstation.... In PAGE 19: ... Her capture-resilient key is then used at these intervals to create a short-lived certificate for a non-capture-resilient public key (a step which does require PIN entry) that is used to sign access requests. As such, the common case incurs only the latency of a signature with this non-capture-resilient key; the measurements in Table1 reflect this. Third, the network address for each of the computers regulating access was already stored in the resource list of the phone and so, e.... In PAGE 20: ... Among the most significant sources of delay are RSA signatures and accessing the Record Management Store (RMS), which is a sim- plified file system and the only long-term storage available to the Java VM. The left columns of Table 2 describe these costs for the Nokia 6620, the device used in the experiments described in Table1 . The 30KB RMS read and write benchmarks measure the time it takes to read and write a standard address-book picture, each about 30KB in size.... ..."
Cited by 18

Table 2: APIs to control device accesses and user-level interrupts.

in Supporting Preemptive User-Level Threads for Embedded Real-Time Systems
by Yangmin Seo, Yangmin Seo, Jungkeun Park, Jungkeun Park, Jungkeun Park, Seongsoo Hong, Seongsoo Hong, Seongsoo Hong
"... In PAGE 9: ...1. Table2 shows function prototypes to get an access right to a device and to register a dedicated handler thread. uio request(ioa start, ioa end, [type]): This function grants a user process a right to access I/O addresses from ioa start to ioa end.... ..."

Table 1: Page migration statistics for executions of BT and SP on 32 processors. Benchmark Res. set Hot pages IRIX migr. User-Level Migr. % Migr. in rst 2 iter.

in A Case for User-Level Dynamic Page Migration
by Dimitrios S. Nikolopoulos, Theodore S. Papatheodorou, Constantine D. Polychronopoulos, Jesús Labarta, Jes Us Labarta, Eduard Ayguadé
"... In PAGE 9: ... We note that in both cases the user-level page migration engine re- duces drastically the number of remote accesses after the rst invocations of the runtime system and that the bench- marks reach very soon an optimal execution point at which the number of remote accesses is practically minimized. Table1 gives some more statistics for the two page migra- tion engines. The statistics in the table were collected from executions of BT and SP on 32 processors.... ..."

Table 1: Page migration statistics for executions of BT and SP on 32 processors. Benchmark Res. set Hot pages IRIX migr. User-Level Migr. % Migr. in rst 2 iter.

in
by User-level Dynamic, Dimitrios S. Nikolopoulos, Theodore S. Papatheodorou, Constantine D. Polychronopoulos, Jes 'us Labarta, Eduard Ayguad 'e
"... In PAGE 9: ... We note that in both cases the user-level page migration engine re- duces drastically the number of remote accesses after the rst invocations of the runtime system and that the bench- marks reach very soon an optimal execution point at which the number of remote accesses is practically minimized. Table1 gives some more statistics for the two page migra- tion engines. The statistics in the table were collected from executions of BT and SP on 32 processors.... ..."

Table 10: A user-level test.

in The Effects of Memory-Rich Environments on File System Microbenchmarks
by An-I A. Wang, Geoffrey Kuenning, Peter Reiher, Gerald J. Popek
"... In PAGE 6: ... Table10 shows an anomaly similar to that in the microbenchmark, verifying that the effects of L2 caching are easily visible in places other than simple file system microbenchmarks. However, these numbers have peculiarities of their own.... ..."

Table 10: A user-level test.

in The Effects of Memory-Rich Environments on File System Microbenchmarks
by unknown authors
"... In PAGE 6: ... Table10 shows an anomaly similar to that in the microbenchmark, verifying that the effects of L2 caching are easily visible in places other than simple file system microbenchmarks. However, these numbers have peculiarities of their own.... ..."

Table 3.1: SEND Instructions The isnd instructions are used in the integer unit, while the fsnd instructions are for the oating-point unit. Only the isnd0 and isnd0o instructions and their oating- point unit counterparts are accessible to user-level threads. While in-order delivery 40

in Mechanisms for Efficient, Protected Messaging
by Whay Sing Lee

Table 2: Code size for the file cache replacement case study. The number of C statements (counted with the num- ber of semicolons) needed to implement both the victimList abstraction within infoLinux and the infoReplace library at user-level is shown.

in Transforming Policies into Mechanisms with Infokernel
by Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Nathan C. Burnett, Timothy E. Denehy, Thomas J. Engle, Haryadi S. Gunawi, James A. Nugent, Florentina I. Popovici 2003
"... In PAGE 6: ... Once this counter is approximately equal to N, the process performs the more expensive call to get the state of the last N pages on the inactive queue. As shown in the top half of Table2 , the victimList abstraction can be implemented in only 109 C statements; in fact, more than half of the code is needed to setup the memory-mapped counter. User-Level Policies: With the victimList abstraction, the user-level infoReplace library can frequently poll the OS and when new pages are near eviction, obtain the list of those pages; if any of these pages should not be evicted according to the target policy, infoReplace accesses them to move them to the active list.... In PAGE 7: ... Following these basic steps, we have implemented FIFO, LRU, MRU, and LFU on top of the Linux 2Q-based re- placement algorithm. The bottom half of Table2 shows the amount of C code needed to implement infoReplace. Although more than one thousand statements are required, most of the code is straightforward, with the bulk for simu- lation of different replacement policies.... ..."
Cited by 25

Table 2: Code size for the le cache replacement case study. The number of C statements (counted with the num- ber of semicolons) needed to implement both the victimList abstraction within infoLinux and the infoReplace library at user-level is shown.

in Transforming Policies into Mechanisms with Infokernel
by Andrea C. Arpaci-dusseau, Remzi H. Arpaci-dusseau, Nathan C. Burnett, Timothy E. Denehy, Thomas J. Engle, Haryadi S. Gunawi, James A. Nugent, Florentina I. Popovici 2003
"... In PAGE 6: ... Once this counter is approximately equal to N, the process performs the more expensive call to get the state of the last N pages on the inactive queue. As shown in the top half of Table2 , the victimList abstraction can be implemented in only 109 C statements; in fact, more than half of the code is needed to setup the memory-mapped counter. User-Level Policies: With the victimList abstraction, the user-level infoReplace library can frequently poll the OS and when new pages are near eviction, obtain the list of those pages; if any of these pages should not be evicted according to the target policy, infoReplace accesses them to move them to the active list.... In PAGE 7: ... Following these basic steps, we have implemented FIFO, LRU, MRU, and LFU on top of the Linux 2Q-based re- placement algorithm. The bottom half of Table2 shows the amount of C code needed to implement infoReplace. Although more than one thousand statements are required, most of the code is straightforward, with the bulk for simu- lation of di erent replacement policies.... ..."
Cited by 25

Table 2: Code size for the file cache replacement case study. The number of C statements (counted with the num- ber of semicolons) needed to implement both the victimList abstraction within infoLinux and the infoReplace library at user-level is shown.

in
by Transforming Policies, Mechanisms Infokernel, Andrea C. Arpaci-dusseau, Remzi H. Arpaci-dusseau, Nathan C. Burnett, Timothy E. Denehy, Thomas J. Engle, Haryadi S. Gunawi, James A. Nugent, Florentina I. Popovici
"... In PAGE 6: ... Once this counter is approximately equal to N, the process performs the more expensive call to get the state of the last N pages on the inactive queue. As shown in the top half of Table2 , the victimList abstraction can be implemented in only 109 C statements; in fact, more than half of the code is needed to setup the memory-mapped counter. User-Level Policies: With the victimList abstraction, the user-level infoReplace library can frequently poll the OS and when new pages are near eviction, obtain the list of those pages; if any of these pages should not be evicted according to the target policy, infoReplace accesses them to move them to the active list.... In PAGE 7: ... Following these basic steps, we have implemented FIFO, LRU, MRU, and LFU on top of the Linux 2Q-based re- placement algorithm. The bottom half of Table2 shows the amount of C code needed to implement infoReplace. Although more than one thousand statements are required, most of the code is straightforward, with the bulk for simu- lation of different replacement policies.... ..."
Next 10 →
Results 1 - 10 of 12,162
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University