Memory

Results: 23062



#Item
471

In Memory Application 2018

Add to Reading List

Source URL: www.vvmf.org

- Date: 2018-03-26 11:16:01
    472

    Characterizing Transactional Memory Consistency Conditions Using Observational Refinement HAGIT ATTIYA, Technion—Israel Institute of Technology ALEXEY GOTSMAN, IMDEA Software Institute SANDEEP HANS, Technion—Israel I

    Add to Reading List

    Source URL: software.imdea.org

    - Date: 2018-02-01 06:29:20
      473

      The Global Sequence Protocol a Memory Model for Distributed Systems Sebastian Burckhardt

      Add to Reading List

      Source URL: jonathan.protzenko.fr

      - Date: 2016-02-21 18:19:49
        474

        Parallel Alpha-Beta Search on Shared Memory Multiprocessors by Valavan Manohararajah

        Add to Reading List

        Source URL: www.top-5000.nl

        - Date: 2007-02-13 11:21:44
          475

          FSU DEPARTMENT OF COMPUTER SCIENCE Decreasing Process Memory Requirements by Overlapping Program Portions

          Add to Reading List

          Source URL: www.cs.fsu.edu

          - Date: 2016-05-22 07:05:30
            476

            Improving Memory Hierarchy Performance for Irregular Applications* John Mellor-Crummey†, David Whalley‡, Ken Kennedy† † Department of Computer Science, MS 132 Rice University 6100 Main Houston, TX 77005

            Add to Reading List

            Source URL: www.cs.fsu.edu

            - Date: 2016-05-21 11:36:03
              477

              Aimed at larger systems. Devices are addressable to 231 bytes, files to 230 bytes. 128K memory (separate instruction and data space) is needed for some utilities. Portability. Code of the operating system and most utilit

              Add to Reading List

              Source URL: wolfram.schneider.org

              - Date: 2012-01-08 15:19:27
                478

                Application for the Osamu Fujiwara Scholarship In Memory of George Meyer And Appreciation of Glenda Cole’s Leadership Submission Deadline: April 6, 2018 Attention: Jim Rogers, Director

                Add to Reading List

                Source URL: ieli.usu.edu

                - Date: 2018-03-14 16:21:45
                  479

                  ++ Corrupting Memory In Microsoft Office Protected-View Sandbox Yong Chuan Koh 08th Nov 2017

                  Add to Reading List

                  Source URL: labs.mwrinfosecurity.com

                  - Date: 2017-11-23 04:48:17
                    480

                    Compositional Verification of Compiler Optimisations on Relaxed Memory Mike Dodds1 , Mark Batty2 , and Alexey Gotsman3 1 Galois Inc.

                    Add to Reading List

                    Source URL: software.imdea.org

                    - Date: 2018-02-20 03:41:12
                      UPDATE