Computing with Memory

Results: 472



#Item
51Frameworks for massively parallel computing: Massively inefficient? Bianca Schroeder* (joint with Nosayba El-Sayed)  University of Toronto

Frameworks for massively parallel computing: Massively inefficient? Bianca Schroeder* (joint with Nosayba El-Sayed) University of Toronto

Add to Reading List

Source URL: tce.technion.ac.il

Language: English - Date: 2015-07-02 01:21:26
52Accelerating Irregular Computations with Hardware Transactional Memory and Active Messages Maciej Besta Torsten Hoefler

Accelerating Irregular Computations with Hardware Transactional Memory and Active Messages Maciej Besta Torsten Hoefler

Add to Reading List

Source URL: htor.inf.ethz.ch

Language: English - Date: 2015-09-14 07:27:20
53A Component Model of Spatial Locality Xiaoming Gu Intel China Research Center Beijing, China Joint work with Ian Christoper,

A Component Model of Spatial Locality Xiaoming Gu Intel China Research Center Beijing, China Joint work with Ian Christoper,

Add to Reading List

Source URL: sysrun.haifa.il.ibm.com

Language: English - Date: 2009-08-27 04:46:16
54Conflict Exceptions: Simplifying Concurrent Language Semantics with Precise Hardware Exceptions for Data-Races Brandon Lucia† Luis Ceze†

Conflict Exceptions: Simplifying Concurrent Language Semantics with Precise Hardware Exceptions for Data-Races Brandon Lucia† Luis Ceze†

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2010-04-14 00:55:30
55Customer Case Study  Distributed Systems Solutions Doubles Its Big Data Analytics Application Throughput with Kaminario K2 Challenge Distributed Systems Solutions, Inc., (DSSI) develops enterprise-class, mission-critical

Customer Case Study Distributed Systems Solutions Doubles Its Big Data Analytics Application Throughput with Kaminario K2 Challenge Distributed Systems Solutions, Inc., (DSSI) develops enterprise-class, mission-critical

Add to Reading List

Source URL: kaminario.com

Language: English - Date: 2014-01-31 16:17:52
56Constant-memory validation of streaming XML documents against DTDs Luc Segoufin and Cristina Sirangelo INRIA and Universit´e Paris 11  Abstract. In this paper we investigate the problem of validating, with constant

Constant-memory validation of streaming XML documents against DTDs Luc Segoufin and Cristina Sirangelo INRIA and Universit´e Paris 11 Abstract. In this paper we investigate the problem of validating, with constant

Add to Reading List

Source URL: www.sirangelo.info

Language: English - Date: 2008-07-06 18:42:17
57DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

DAC vs. MAC • Most people familiar with discretionary access control (DAC) - Unix permission bits are an example - Might set a file private so only group friends can read it

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
58Security IC Platform PP with packages

Security IC Platform PP with packages

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-08-25 01:47:51
59Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token, USB Memory Stick or just a plain Memory Card such as I2c or Mifare. Authentication is not limited to the

Aloaha Smartlogin Aloaha Smartlogin allows you to logon to your windows machine with a Smart Card, PKCS #11 Token, USB Memory Stick or just a plain Memory Card such as I2c or Mifare. Authentication is not limited to the

Add to Reading List

Source URL: www.aloaha.com

Language: English - Date: 2014-06-14 07:53:35
60ORACLE DATA SHEET  MySQL CLUSTER MEMORY OPTMIZED PERFORMANCE & WEB SCALABILITY WITH% AVAILABILITY

ORACLE DATA SHEET MySQL CLUSTER MEMORY OPTMIZED PERFORMANCE & WEB SCALABILITY WITH% AVAILABILITY

Add to Reading List

Source URL: www-jp.mysql.com

Language: English - Date: 2015-02-26 10:57:55