Journal articles on the topic 'Cache codée'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cache codée.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ding, Wei, Yuanrui Zhang, Mahmut Kandemir, and Seung Woo Son. "Compiler-Directed File Layout Optimization for Hierarchical Storage Systems." Scientific Programming 21, no. 3-4 (2013): 65–78. http://dx.doi.org/10.1155/2013/167581.
Full textCalciu, Irina, M. Talha Imran, Ivan Puddu, et al. "Using Local Cache Coherence for Disaggregated Memory Systems." ACM SIGOPS Operating Systems Review 57, no. 1 (2023): 21–28. http://dx.doi.org/10.1145/3606557.3606561.
Full textPan, Qinglin, Ji Qi, Jiatai He, Heng Zhang, Jiageng Yu, and Yanjun Wu. "Beaver: A High-Performance and Crash-Consistent File System Cache via PM-DRAM Collaborative Memory Tiering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–24. https://doi.org/10.1145/3700414.
Full textPan, Qinglin, Ji Qi, Jiatai He, Heng Zhang, Jiageng Yu, and Yanjun Wu. "Beaver: A High-Performance and Crash-Consistent File System Cache via PM-DRAM Collaborative Memory Tiering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 70–72. https://doi.org/10.1145/3744970.3727273.
Full textCharrier, Dominic E., Benjamin Hazelwood, Ekaterina Tutlyaeva, et al. "Studies on the energy and deep memory behaviour of a cache-oblivious, task-based hyperbolic PDE solver." International Journal of High Performance Computing Applications 33, no. 5 (2019): 973–86. http://dx.doi.org/10.1177/1094342019842645.
Full textMoon, S. M. "Increasing cache bandwidth using multiport caches for exploiting ILP in non-numerical code." IEE Proceedings - Computers and Digital Techniques 144, no. 5 (1997): 295. http://dx.doi.org/10.1049/ip-cdt:19971283.
Full textMittal, Shaily, and Nitin. "Memory Map: A Multiprocessor Cache Simulator." Journal of Electrical and Computer Engineering 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/365091.
Full textMa, Ruhui, Haibing Guan, Erzhou Zhu, Yongqiang Gao, and Alei Liang. "Code cache management based on working set in dynamic binary translator." Computer Science and Information Systems 8, no. 3 (2011): 653–71. http://dx.doi.org/10.2298/csis100327022m.
Full textDas, Abhishek, and Nur A. Touba. "A Single Error Correcting Code with One-Step Group Partitioned Decoding Based on Shared Majority-Vote." Electronics 9, no. 5 (2020): 709. http://dx.doi.org/10.3390/electronics9050709.
Full textSimecek, Ivan, and Pavel Tvrdík. "A new code transformation technique for nested loops." Computer Science and Information Systems 11, no. 4 (2014): 1381–416. http://dx.doi.org/10.2298/csis131126075s.
Full textGuillon, Christophe, Fabrice Rastello, Thierry Bidault, and Florent Bouchez. "Procedure placement using temporal-ordering information: Dealing with code size expansion." Journal of Embedded Computing 1, no. 4 (2005): 437–59. https://doi.org/10.3233/emc-2005-00045.
Full textLuo, Ya Li. "Research of Adaptive Control Algorithm Based on the Cached Playing of Streaming Media." Applied Mechanics and Materials 539 (July 2014): 502–6. http://dx.doi.org/10.4028/www.scientific.net/amm.539.502.
Full textHeirman, Wim, Stijn Eyerman, Kristof Du Bois, and Ibrahim Hur. "Automatic Sublining for Efficient Sparse Memory Accesses." ACM Transactions on Architecture and Code Optimization 18, no. 3 (2021): 1–23. http://dx.doi.org/10.1145/3452141.
Full textПуйденко, Вадим Олексійович, та Вячеслав Сергійович Харченко. "МІНІМІЗАЦІЯ ЛОГІЧНОЇ СХЕМИ ДЛЯ РЕАЛІЗАЦІЇ PSEUDO LRU ШЛЯХОМ МІЖТИПОВОГО ПЕРЕХОДУ У ТРИГЕРНИХ СТРУКТУРАХ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 2 (26 квітня 2020): 33–47. http://dx.doi.org/10.32620/reks.2020.2.03.
Full textSasongko, Muhammad Aditya, Milind Chabbi, Mandana Bagheri Marzijarani, and Didem Unat. "ReuseTracker : Fast Yet Accurate Multicore Reuse Distance Analyzer." ACM Transactions on Architecture and Code Optimization 19, no. 1 (2022): 1–25. http://dx.doi.org/10.1145/3484199.
Full textZhang, Kang, Fan Fu Zhou, and Alei Liang. "DCC: A Replacement Strategy for DBT System Based on Working Sets." Applied Mechanics and Materials 251 (December 2012): 114–18. http://dx.doi.org/10.4028/www.scientific.net/amm.251.114.
Full textGordon-Ross, Ann, Frank Vahid, and Nikil Dutt. "Combining code reordering and cache configuration." ACM Transactions on Embedded Computing Systems 11, no. 4 (2012): 1–20. http://dx.doi.org/10.1145/2362336.2399177.
Full textDuangthong, Chatuporn, Pornchai Supnithi, and Watid Phakphisut. "Two-Dimensional Error Correction Code for Spin-Transfer Torque Magnetic Random-Access Memory (STT-MRAM) Caches." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (2022): 237–46. http://dx.doi.org/10.37936/ecti-cit.2022163.246903.
Full textZhao, Yiqiang, Boning Shi, Qizhi Zhang, Yidong Yuan, and Jiaji He. "Research on Cache Coherence Protocol Verification Method Based on Model Checking." Electronics 12, no. 16 (2023): 3420. http://dx.doi.org/10.3390/electronics12163420.
Full textDing, Chen, Dong Chen, Fangzhou Liu, Benjamin Reber, and Wesley Smith. "CARL: Compiler Assigned Reference Leasing." ACM Transactions on Architecture and Code Optimization 19, no. 1 (2022): 1–28. http://dx.doi.org/10.1145/3498730.
Full textVishnekov, A. V., and E. M. Ivanova. "DYNAMIC CONTROL METHODS OF CACHE LINES REPLACEMENT POLICY." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 191 (May 2020): 49–56. http://dx.doi.org/10.14489/vkit.2020.05.pp.049-056.
Full textVishnekov, A. V., and E. M. Ivanova. "DYNAMIC CONTROL METHODS OF CACHE LINES REPLACEMENT POLICY." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 191 (May 2020): 49–56. http://dx.doi.org/10.14489/vkit.2020.05.pp.049-056.
Full textMa, Cong, Dinghao Wu, Gang Tan, Mahmut Taylan Kandemir, and Danfeng Zhang. "Quantifying and Mitigating Cache Side Channel Leakage with Differential Set." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 1470–98. http://dx.doi.org/10.1145/3622850.
Full textSahuquillo, Julio, Noel Tomas, Salvador Petit, and Ana Pont. "Spim-Cache: A Pedagogical Tool for Teaching Cache Memories Through Code-Based Exercises." IEEE Transactions on Education 50, no. 3 (2007): 244–50. http://dx.doi.org/10.1109/te.2007.900021.
Full textLiu, Cong, Xinyu Xu, Zhenjiao Chen, and Binghao Wang. "A Universal-Verification-Methodology-Based Testbench for the Coverage-Driven Functional Verification of an Instruction Cache Controller." Electronics 12, no. 18 (2023): 3821. http://dx.doi.org/10.3390/electronics12183821.
Full textYash, Kumar, and B. Ramesh K. "Analysis and Optimization of Memory Hierarchy." Recent Trends in Analog Design and Digital Devices 5, no. 1 (2022): 1–5. https://doi.org/10.5281/zenodo.6388324.
Full textMakhkamova, Ozoda, and Doohyun Kim. "A Conversation History-Based Q&A Cache Mechanism for Multi-Layered Chatbot Services." Applied Sciences 11, no. 21 (2021): 9981. http://dx.doi.org/10.3390/app11219981.
Full textLin, Bo, Shangwen Wang, Ming Wen, and Xiaoguang Mao. "Context-Aware Code Change Embedding for Better Patch Correctness Assessment." ACM Transactions on Software Engineering and Methodology 31, no. 3 (2022): 1–29. http://dx.doi.org/10.1145/3505247.
Full textCheng, Shing Hing William, Chitchanok Chuengsatiansup, Daniel Genkin, et al. "Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (2024): 224–48. http://dx.doi.org/10.46586/tches.v2024.i3.224-248.
Full textAnsari, Ali, Pejman Lotfi-Kamran, and Hamid Sarbazi-Azad. "Code Layout Optimization for Near-Ideal Instruction Cache." IEEE Computer Architecture Letters 18, no. 2 (2019): 124–27. http://dx.doi.org/10.1109/lca.2019.2924429.
Full textTomiyama, Hiroyuki, and Hiroto Yasuura. "Code placement techniques for cache miss rate reduction." ACM Transactions on Design Automation of Electronic Systems 2, no. 4 (1997): 410–29. http://dx.doi.org/10.1145/268424.268469.
Full textRyoo, Jihyun, Mahmut Taylan Kandemir, and Mustafa Karakoy. "Memory Space Recycling." Proceedings of the ACM on Measurement and Analysis of Computing Systems 6, no. 1 (2022): 1–24. http://dx.doi.org/10.1145/3508034.
Full textBłaszyński, Piotr, and Włodzimierz Bielecki. "High-Performance Computation of the Number of Nested RNA Structures with 3D Parallel Tiled Code." Eng 4, no. 1 (2023): 507–25. http://dx.doi.org/10.3390/eng4010030.
Full textBielecki, Włodzimierz, Piotr Błaszyński, and Marek Pałkowski. "3D Tiled Code Generation for Nussinov’s Algorithm." Applied Sciences 12, no. 12 (2022): 5898. http://dx.doi.org/10.3390/app12125898.
Full textMurugan, Dr. "Hybrid LRU Algorithm for Enterprise Data Hub using Serverless Architecture." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 4 (2021): 441–49. http://dx.doi.org/10.17762/turcomat.v12i4.525.
Full textSteenkiste, P. "The impact of code density on instruction cache performance." ACM SIGARCH Computer Architecture News 17, no. 3 (1989): 252–59. http://dx.doi.org/10.1145/74926.74954.
Full textMarathe, Jaydeep, and Frank Mueller. "Source-Code-Correlated Cache Coherence Characterization of OpenMP Benchmarks." IEEE Transactions on Parallel and Distributed Systems 18, no. 6 (2007): 818–34. http://dx.doi.org/10.1109/tpds.2007.1058.
Full textNaik Dessai, Sanket Suresh, and Varuna Eswer. "Embedded Software Testing to Determine BCM5354 Processor Performance." International Journal of Software Engineering and Technologies (IJSET) 1, no. 3 (2016): 121. http://dx.doi.org/10.11591/ijset.v1i3.4577.
Full textOktrifianto, Rahmat, Dani Adhipta, and Warsun Najib. "Page Load Time Speed Increase on Disease Outbreak Investigation Information System Website." IJITEE (International Journal of Information Technology and Electrical Engineering) 2, no. 4 (2019): 114. http://dx.doi.org/10.22146/ijitee.46599.
Full textWang, Xiang, Zongmin Zhao, Dongdong Xu, et al. "Two-Stage Checkpoint Based Security Monitoring and Fault Recovery Architecture for Embedded Processor." Electronics 9, no. 7 (2020): 1165. http://dx.doi.org/10.3390/electronics9071165.
Full textPitchanathan, Arjun, Kunwar Grover, and Tobias Grosser. "Falcon: A Scalable Analytical Cache Model." Proceedings of the ACM on Programming Languages 8, PLDI (2024): 1854–78. http://dx.doi.org/10.1145/3656452.
Full textEswer, Varuna, and Sanket Suresh Naik Dessai. "Embedded Software Engineering Approach to Implement BCM5354 Processor Performance." International Journal of Software Engineering and Technologies (IJSET) 1, no. 1 (2016): 41. http://dx.doi.org/10.11591/ijset.v1i1.4568.
Full textSteiner, Michael, Thomas Köhler, Lukas Radl, and Markus Steinberger. "Frustum Volume Caching for Accelerated NeRF Rendering." Proceedings of the ACM on Computer Graphics and Interactive Techniques 7, no. 3 (2024): 1–22. http://dx.doi.org/10.1145/3675370.
Full textBenini, L., A. Macii, and A. Nannarelli. "Code compression architecture for cache energy minimisation in embedded systems." IEE Proceedings - Computers and Digital Techniques 149, no. 4 (2002): 157. http://dx.doi.org/10.1049/ip-cdt:20020467.
Full textChen, W. Y., P. P. Chang, T. M. Conte, and W. W. Hwu. "The effect of code expanding optimizations on instruction cache design." IEEE Transactions on Computers 42, no. 9 (1993): 1045–57. http://dx.doi.org/10.1109/12.241594.
Full textWang, Weike, Xiang Wang, Pei Du, et al. "Embedded System Confidentiality Protection by Cryptographic Engine Implemented with Composite Field Arithmetic." MATEC Web of Conferences 210 (2018): 02047. http://dx.doi.org/10.1051/matecconf/201821002047.
Full textFahringer, T., and A. Požgaj. "P3T+: A Performance Estimator for Distributed and Parallel Programs." Scientific Programming 8, no. 2 (2000): 73–93. http://dx.doi.org/10.1155/2000/217384.
Full textShin, Dong-Jin, and Jeong-Joon Kim. "Cache-Based Matrix Technology for Efficient Write and Recovery in Erasure Coding Distributed File Systems." Symmetry 15, no. 4 (2023): 872. http://dx.doi.org/10.3390/sym15040872.
Full textSieck, Florian, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, and Yuval Yarom. "TeeJam: Sub-Cache-Line Leakages Strike Back." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 1 (2023): 457–500. http://dx.doi.org/10.46586/tches.v2024.i1.457-500.
Full textCho, Won, and Joonho Kong. "Memory and Cache Contention Denial-of-Service Attack in Mobile Edge Devices." Applied Sciences 11, no. 5 (2021): 2385. http://dx.doi.org/10.3390/app11052385.
Full text