CPUID

Results: 135



#Item
21Imperial College London Department of Computing Computer Systems (M2) Pentium programming – lab exercise You’ll learn more about assembly language programming as the course progresses. In the meantime you’re encour

Imperial College London Department of Computing Computer Systems (M2) Pentium programming – lab exercise You’ll learn more about assembly language programming as the course progresses. In the meantime you’re encour

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-11-20 09:55:10
22An evaluation of the automatic generation of parallel X86 SIMD integer instructions by GCC and ICC Isabelle Hurbain November, 15th

An evaluation of the automatic generation of parallel X86 SIMD integer instructions by GCC and ICC Isabelle Hurbain November, 15th

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2006-02-28 09:49:25
23jcstress Breaking Concurrency Bad Aleksey Shipilev , @shipilev  The following is intended to outline our general

jcstress Breaking Concurrency Bad Aleksey Shipilev , @shipilev The following is intended to outline our general

Add to Reading List

Source URL: shipilev.net

Language: English - Date: 2013-07-30 20:33:26
24Intel® OpenSource HD Graphics Programmer’s Reference Manual (PRM) Volume 1 Part 3: Graphics Core™ – Memory Interface and Commands for the Render Engine (Ivy Bridge)

Intel® OpenSource HD Graphics Programmer’s Reference Manual (PRM) Volume 1 Part 3: Graphics Core™ – Memory Interface and Commands for the Render Engine (Ivy Bridge)

Add to Reading List

Source URL: files.renderingpipeline.com

Language: English - Date: 2013-09-24 10:25:59
25Stale	
  pointers	
  are	
  the	
  new	
  black	
   Vincenzo	
  Iozzo,	
  Giovanni	
  Gola	
   	
   	
    Disclaimer	
  

Stale  pointers  are  the  new  black   Vincenzo  Iozzo,  Giovanni  Gola       Disclaimer  

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:18
26Using Instruction Sequence Abstraction for Shellcode Detection and Attribution Ziming Zhao and Gail-Joon Ahn Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA

Using Instruction Sequence Abstraction for Shellcode Detection and Attribution Ziming Zhao and Gail-Joon Ahn Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2013-07-11 17:06:53
27PEG-based transformer provides front-, middle and back-end stages in a simple compiler Ian Piumarta  VPRI Technical Report TR

PEG-based transformer provides front-, middle and back-end stages in a simple compiler Ian Piumarta VPRI Technical Report TR

Add to Reading List

Source URL: www.vpri.org

Language: English - Date: 2015-01-21 19:12:50
28Barriers: Friend or Foe?  Steve Blackburn Tony Hosking

Barriers: Friend or Foe? Steve Blackburn Tony Hosking

Add to Reading List

Source URL: researchweb.watson.ibm.com

Language: English - Date: 2005-02-16 12:34:05
29Attacks on More Virtual Machines

Attacks on More Virtual Machines

Add to Reading List

Source URL: pferrie.tripod.com

Language: English - Date: 2007-04-11 17:33:36
30Intel® Xeon Phi™ Coprocessor x100 Product Family Specification Update March[removed]Reference Number: [removed]

Intel® Xeon Phi™ Coprocessor x100 Product Family Specification Update March[removed]Reference Number: [removed]

Add to Reading List

Source URL: www.transtec.fr

Language: English - Date: 2013-04-08 02:58:51