Memory

Results: 23062



#Item
21Computing / Concurrent computing / Information and communications technology / Fault-tolerant computer systems / Parallel computing / Apache Software Foundation / Hadoop / Cluster computing / Application checkpointing / Apache Hadoop / Data-intensive computing / Apache Spark

Tachyon: Reliable, Memory Speed Storage for Cluster Computing Frameworks Haoyuan Li Ali Ghodsi

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-08-21 15:09:54
22Computing / Computational neuroscience / Computer data storage / Emerging technologies / Non-volatile random-access memory / Artificial intelligence / Technology / Computer architecture / Nano-RAM / Solid-state drive / Deep learning / Dynamic random-access memory

White Paper Memory Class Storage for AI Getting Back Up;

Add to Reading List

Source URL: nantero.com

Language: English - Date: 2018-08-27 11:48:40
23Computer data storage / Computing / Computer memory / System software / Non-volatile memory / Embedded Linux / UBIFS / Flash memory / Memory Technology Device / Flash file system / Wear leveling / Data

Formal Specification of an Erase Block Management Layer for Flash Memory ? J¨ org Pf¨ ahler, Gidon Ernst, Gerhard Schellhorn, Dominik Haneberg, and Wolfgang Reif

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2017-01-11 10:46:01
24Computing / Software engineering / Concurrent computing / Concurrency control / C++ / Parallel computing / Transaction processing / Concurrency / Linearizability / C++11 / Thread / POSIX Threads

The C/C++ Memory Model: Overview and Formalization Mark Batty Jasmin Blanchette Susmit Sarkar Peter Sewell

Add to Reading List

Source URL: user.it.uu.se

Language: English - Date: 2015-05-22 10:51:47
25Computer architecture / Computing / Computer hardware / Central processing unit / X86 architecture / Computer memory / Side-channel attacks / Virtual memory / Translation lookaside buffer / CPU cache / Meltdown / Spectre

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

Add to Reading List

Source URL: mlq.me

Language: English - Date: 2018-08-17 12:03:32
26Concurrency control / Edsger W. Dijkstra / Flag / Vexillology / Mutual exclusion / Computer programming / Critical section / Thread / Computing / Software engineering / Peterson's algorithm / Lamport's bakery algorithm

Effective Abstractions for Verification under Relaxed Memory Models Andrei Dan ETH Zurich Yuri Meshman

Add to Reading List

Source URL: practicalsynthesis.github.io

Language: English - Date: 2018-01-15 09:26:26
27Computer hardware / Computer architecture / Computing / Side-channel attacks / Computer security / X86 architecture / Central processing unit / Computer memory / Spectre / Microarchitecture / CPU cache / Meltdown

NetSpectre: Read Arbitrary Memory over Network Michael Schwarz Martin Schwarzl Graz University of Technology

Add to Reading List

Source URL: mlq.me

Language: English - Date: 2018-08-17 12:03:32
28Pointer / Graph

A Context-Sensitive Memory Model for Verification of C/C++ Programs? Arie Gurfinkel1 and Jorge A. Navas2 1 University of Waterloo (Canada)

Add to Reading List

Source URL: seahorn.github.io

Language: English - Date: 2018-08-03 20:31:21
29Logic / Mathematical logic / Linguistics / Dekker's algorithm / Edsger W. Dijkstra / Predicate / Flag

Predicate Abstraction for Relaxed Memory Models Andrei Dan Martin Vechev

Add to Reading List

Source URL: practicalsynthesis.github.io

Language: English - Date: 2018-01-15 09:26:26
30Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
UPDATE