• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,015
Next 10 →

Memory Coherence in Shared Virtual Memory Systems

by Kai Li, Paul Hudak , 1989
"... This paper studies the memory coherence problem in designing said inaplementing a shared virtual memory on looselycoupled multiprocessors. Two classes of aIgoritb. ms for solving the problem are presented. A prototype shared virtual memory on an Apollo ring has been implemented based on these a ..."
Abstract - Cited by 957 (17 self) - Add to MetaCart
This paper studies the memory coherence problem in designing said inaplementing a shared virtual memory on looselycoupled multiprocessors. Two classes of aIgoritb. ms for solving the problem are presented. A prototype shared virtual memory on an Apollo ring has been implemented based

Virtual Memory

by Peter J. Denning - ACM Computing Surveys , 1970
"... The need for automatic storage allocation arises from desires for program modularity, machine independence, and resource sharing. Virtual memory is an elegant way of achieving these objectives. In a virtual memory, the addresses a program may use to identify information are distinguished from the ad ..."
Abstract - Cited by 152 (6 self) - Add to MetaCart
The need for automatic storage allocation arises from desires for program modularity, machine independence, and resource sharing. Virtual memory is an elegant way of achieving these objectives. In a virtual memory, the addresses a program may use to identify information are distinguished from

VIRTUAL MEMORY

by unknown authors , 2008
"... Abstract: Virtual memory is the simulation of a storage space so large that users do not need to recompile their works when storage configurations change. Every byte of the virtual memory is addressed in the same way, regardless of the placement of address pace components in the memory hierarchy. ..."
Abstract - Add to MetaCart
Abstract: Virtual memory is the simulation of a storage space so large that users do not need to recompile their works when storage configurations change. Every byte of the virtual memory is addressed in the same way, regardless of the placement of address pace components in the memory hierarchy.

Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer

by Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg - IN PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE , 1994
"... The network interfaces of existing multicomputers require a significant amount of software overhead to provide protection and to implement message passing protocols. This paper describes the design of a low-latency, high-bandwidth, virtual memory-mapped network interface for the SHRIMP multicomputer ..."
Abstract - Cited by 267 (24 self) - Add to MetaCart
The network interfaces of existing multicomputers require a significant amount of software overhead to provide protection and to implement message passing protocols. This paper describes the design of a low-latency, high-bandwidth, virtual memory-mapped network interface for the SHRIMP

Virtual Memory Primitives for User Programs

by Andrew W. Appel, Kai Li , 1991
"... Memory Management Units (MMUs) are traditionally used by operating systems to implement disk-paged virtual memory. Some operating systems allow user programs to specify the protection level (inaccessible, readonly. read-write) of pages, and allow user programs t.o handle protection violations. bur. ..."
Abstract - Cited by 189 (2 self) - Add to MetaCart
Memory Management Units (MMUs) are traditionally used by operating systems to implement disk-paged virtual memory. Some operating systems allow user programs to specify the protection level (inaccessible, readonly. read-write) of pages, and allow user programs t.o handle protection violations. bur

Lightweight recoverable virtual memory

by M. Satyanarayanan, Henry H. Mashburn, Puneet Kumar, David C. Steere, James J. Kistler - ACM Transactions on Computer Systems , 1994
"... Recoverable virtual memory refers to regions of a virtual This combination of circumstances is most likely to be found in situations involving the meta-data of storage address space on which transactional guarantees are repositories. Thus RVM can benefit a wide range of offered. This paper describes ..."
Abstract - Cited by 122 (10 self) - Add to MetaCart
Recoverable virtual memory refers to regions of a virtual This combination of circumstances is most likely to be found in situations involving the meta-data of storage address space on which transactional guarantees are repositories. Thus RVM can benefit a wide range of offered. This paper

Virtual Memory

by Christoph Kessler Ida, C. Kessler, Linköpings Universitet, C. Kessler, Linköpings Universitet
"... Concepts”, 7th ed., Wiley, 2005). No part of the lecture notes may be reproduced in any form, due to the copyrights ..."
Abstract - Add to MetaCart
Concepts”, 7th ed., Wiley, 2005). No part of the lecture notes may be reproduced in any form, due to the copyrights

Logged Virtual Memory

by David Cheriton, Kenneth J. Duda - In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain , 1995
"... Logged virtual memory (LVM) provides a log of writes to one or more specified regions of the virtual address space. Logging is useful for applications that require rollback and/or persistence such as parallel simulations and memory-mapped object-oriented databases. It can also be used for output, de ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Logged virtual memory (LVM) provides a log of writes to one or more specified regions of the virtual address space. Logging is useful for applications that require rollback and/or persistence such as parallel simulations and memory-mapped object-oriented databases. It can also be used for output

Logged Virtual Memory

by David Cheriton And, David R. Cheriton, Kenneth J. Duda - In Proceedings of the 15th ACM Symposium on Operating Systems Principles (Copper Mountain , 1995
"... Logged virtual memory (LVM) provides a log of writes to one or more specified regions of the virtual address space. Logging is useful for applications that require rollback and/or persistence such as parallel simulations and memory-mapped object-oriented databases. It can also be used for output, de ..."
Abstract - Add to MetaCart
Logged virtual memory (LVM) provides a log of writes to one or more specified regions of the virtual address space. Logging is useful for applications that require rollback and/or persistence such as parallel simulations and memory-mapped object-oriented databases. It can also be used for output

Encrypting Virtual Memory

by Niels Provos - In Proceedings of the Ninth USENIX Security Symposium , 2000
"... In modern operating systems, cryptographic file systems can protect confidential data from unauthorized access. However, once an authorized process has accessed data from a cryptographic file system, the data can appear as plaintext in the unprotected virtual memory backing store, even after system ..."
Abstract - Cited by 50 (0 self) - Add to MetaCart
In modern operating systems, cryptographic file systems can protect confidential data from unauthorized access. However, once an authorized process has accessed data from a cryptographic file system, the data can appear as plaintext in the unprotected virtual memory backing store, even after system
Next 10 →
Results 1 - 10 of 5,015
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University