• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 31 - 40 of 243
Next 10 →

WCDRAM: A fully associative integrated Cached-DRAM with wide cache lines

by Gershon Kedem, Gershon Kedem, Ram Prasad Koganti, Ram Prasad Koganti , 1997
"... This paper presents an integrated, fully associative, wide Cached-DRAM (WCDRAM). We propose a fully associative cache with very large blocks (1KB-8KB) but few entries (32-128), integrated with the DRAM array. By doing this, we exploit the internal bandwidth inherent in DRAM access. A single row addr ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
This paper presents an integrated, fully associative, wide Cached-DRAM (WCDRAM). We propose a fully associative cache with very large blocks (1KB-8KB) but few entries (32-128), integrated with the DRAM array. By doing this, we exploit the internal bandwidth inherent in DRAM access. A single row

Supporting rfid-based item tracking applications in oracle dbms using a bitmap datatype

by Ying Hu, Seema Sundara, Timothy Chorma, Jagannathan Srinivasan - In Proceedings of the 31st International Conference on Very Large Data Bases , 2005
"... Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the high volume of data generated by item-level tracking poses challenges to the applications as well as to backend databases. ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
Radio Frequency Identification (RFID) based item-level tracking holds the promise of revolutionizing supply-chain, retail store, and asset management applications. However, the high volume of data generated by item-level tracking poses challenges to the applications as well as to backend databases

Anatomy of the ado.net entity framework

by Atul Adya, José A. Blakeley, Sergey Melnik, S. Muralidhar - In SIGMOD’07 , 2007
"... Traditional client-server applications relegate query and persistence operations on their data to database systems. The database system operates on data in the form of rows and tables, while the application operates on data in terms of higher-level programming language constructs (classes, structure ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
Traditional client-server applications relegate query and persistence operations on their data to database systems. The database system operates on data in the form of rows and tables, while the application operates on data in terms of higher-level programming language constructs (classes

Exploiting Program Cyclic Behavior to Reduce Memory Latency in Embedded Processors

by Ehsan Atoofian, Amirali Baniasadi
"... In this work we modify the conventional row buffer allocation mechanism used in DDR2 SDRAM banks to improve average memory latency and overall processor performance. Our method assigns row buffers to different banks dynamically and by taking into account program cyclic behavior and bank row buffer d ..."
Abstract - Add to MetaCart
demand. As we show in this work, memory requests go through several phases. In each phase, programs tend to access a single bank most of the time. We exploit this repetitive behavior and improve the concurrency level for memory read and write operations. We do so by assigning idle row buffers to more

A case for small row buffers in non-volatile main memories

by Justin Meza, Jing Li, Onur Mutlu
"... Abstract—DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping schem ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract—DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping

An XML-Based Security Management Model for Multilevel Security Databases

by Awad Awadelkarim, Norbik Idris , 2004
"... Abstract: This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges, co ..."
Abstract - Add to MetaCart
Abstract: This paper proposes a universal architecture of Security Management Model (SMM) for integrating security features namely low-level access control at row and column level of relational legacy databases using XML as an integration medium. The proposed model integrates and then rearranges

Efficient and Tiled Polygon Traversal Using Half-Plane Edge Functions

by Joel Mccormack, Robert Mcnamara
"... Existing techniques for traversing a polygon generate frag-ments one (or more) rows or columns at a time. (A fragment is all the information needed to paint one pixel of the polygon.) This order is non-optimal for many operations. For example, most frame buffers are tiled into rectangular pages, an ..."
Abstract - Cited by 23 (0 self) - Add to MetaCart
Existing techniques for traversing a polygon generate frag-ments one (or more) rows or columns at a time. (A fragment is all the information needed to paint one pixel of the polygon.) This order is non-optimal for many operations. For example, most frame buffers are tiled into rectangular pages

05 SIMULTANEOUS CLASSICAL-QUANTUM CAPACITIES OF QUANTUM MULTIPLE ACCESS CHANNELS

by Abbas El Gamal, Carl A. Yard , 2005
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Technologies

by André Rodrigues, Tiago Guerreiro
"... Mobile operating systems have evolved to provide increasing accessibility capabilities. However, mobile application developers are still restricted to deploy custom-made accessible applications or to extend limited and stereotyped accessibility services. In this paper, we present SWAT, an extensible ..."
Abstract - Add to MetaCart
, an extensible framework that provides system-level content and event information to application developers. Its use is demonstrated in a multi-impairment case study achieving automatic row-column scanning with audio feedback. SWAT presents strengths usable in several other system-wide contexts that empower

Evaluating row buffer locality in future non-volatile main memories,” SAFARI

by Justin Meza, Jing Li, Onur Mutlu, Justin Meza, Jing Li, Onur Mutlu , 2012
"... DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping schemes that i ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
DRAM-based main memories have read operations that destroy the read data, and as a result, must buffer large amounts of data on each array access to keep chip costs low. Unfortunately, system-level trends such as increased memory contention in multi-core architectures and data mapping schemes
Next 10 →
Results 31 - 40 of 243
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University