Results 31 - 40
of
243
WCDRAM: A fully associative integrated Cached-DRAM with wide cache lines
, 1997
"... This paper presents an integrated, fully associative, wide Cached-DRAM (WCDRAM). We propose a fully associative cache with very large blocks (1KB-8KB) but few entries (32-128), integrated with the DRAM array. By doing this, we exploit the internal bandwidth inherent in DRAM access. A single row addr ..."
Abstract
-
Cited by 17 (1 self)
- Add to MetaCart
This paper presents an integrated, fully associative, wide Cached-DRAM (WCDRAM). We propose a fully associative cache with very large blocks (1KB-8KB) but few entries (32-128), integrated with the DRAM array. By doing this, we exploit the internal bandwidth inherent in DRAM access. A single row
Supporting rfid-based item tracking applications in oracle dbms using a bitmap datatype
- In Proceedings of the 31st International Conference on Very Large Data Bases
, 2005
"... Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the high volume of data generated by item-level tracking poses challenges to the applications as well as to backend databases. ..."
Abstract
-
Cited by 22 (0 self)
- Add to MetaCart
Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the high volume of data generated by item-level tracking poses challenges to the applications as well as to backend databases
Anatomy of the ado.net entity framework
- In SIGMOD’07
, 2007
"... Traditional client-server applications relegate query and persistence operations on their data to database systems. The database system operates on data in the form of rows and tables, while the application operates on data in terms of higher-level programming language constructs (classes, structure ..."
Abstract
-
Cited by 18 (0 self)
- Add to MetaCart
Traditional client-server applications relegate query and persistence operations on their data to database systems. The database system operates on data in the form of rows and tables, while the application operates on data in terms of higher-level programming language constructs (classes
Exploiting Program Cyclic Behavior to Reduce Memory Latency in Embedded Processors
"... In this work we modify the conventional row buffer allocation mechanism used in DDR2 SDRAM banks to improve average memory latency and overall processor performance. Our method assigns row buffers to different banks dynamically and by taking into account program cyclic behavior and bank row buffer d ..."
Abstract
- Add to MetaCart
demand. As we show in this work, memory requests go through several phases. In each phase, programs tend to access a single bank most of the time. We exploit this repetitive behavior and improve the concurrency level for memory read and write operations. We do so by assigning idle row buffers to more
A case for small row buffers in non-volatile main memories
"... Abstract—DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping schem ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract—DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping
An XML-Based Security Management Model for Multilevel Security Databases
, 2004
"... Abstract: This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges, co ..."
Abstract
- Add to MetaCart
Abstract: This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges
Efficient and Tiled Polygon Traversal Using Half-Plane Edge Functions
"... Existing techniques for traversing a polygon generate frag-ments one (or more) rows or columns at a time. (A fragment is all the information needed to paint one pixel of the polygon.) This order is non-optimal for many operations. For example, most frame buffers are tiled into rectangular pages, an ..."
Abstract
-
Cited by 23 (0 self)
- Add to MetaCart
Existing techniques for traversing a polygon generate frag-ments one (or more) rows or columns at a time. (A fragment is all the information needed to paint one pixel of the polygon.) This order is non-optimal for many operations. For example, most frame buffers are tiled into rectangular pages
05 SIMULTANEOUS CLASSICAL-QUANTUM CAPACITIES OF QUANTUM MULTIPLE ACCESS CHANNELS
, 2005
"... ar ..."
Technologies
"... Mobile operating systems have evolved to provide increasing accessibility capabilities. However, mobile application developers are still restricted to deploy custom-made accessible applications or to extend limited and stereotyped accessibility services. In this paper, we present SWAT, an extensible ..."
Abstract
- Add to MetaCart
, an extensible framework that provides system-level content and event information to application developers. Its use is demonstrated in a multi-impairment case study achieving automatic row-column scanning with audio feedback. SWAT presents strengths usable in several other system-wide contexts that empower
Evaluating row buffer locality in future non-volatile main memories,” SAFARI
, 2012
"... DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping schemes that i ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping schemes
Results 31 - 40
of
243