咨询与建议

限定检索结果

文献类型

  • 46 篇 会议
  • 31 册 图书
  • 25 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 68 篇 工学
    • 48 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 29 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 3 篇 机械工程
    • 3 篇 建筑学
    • 1 篇 仪器科学与技术
    • 1 篇 水利工程
    • 1 篇 化学工程与技术
    • 1 篇 石油与天然气工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 2 篇 地球物理学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 物理学
  • 6 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 5 篇 教育学
    • 5 篇 教育学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
    • 1 篇 美术学

主题

  • 104 篇 program executio...
  • 30 篇 program
  • 16 篇 data
  • 14 篇 command
  • 12 篇 manual
  • 11 篇 print
  • 11 篇 basic
  • 9 篇 file
  • 9 篇 breakpoint
  • 9 篇 display
  • 8 篇 statement
  • 7 篇 address
  • 7 篇 debugging
  • 7 篇 execution
  • 7 篇 legal executions
  • 6 篇 string
  • 6 篇 memory
  • 6 篇 location
  • 5 篇 reference manual
  • 5 篇 commands

机构

  • 2 篇 penn state univ ...
  • 2 篇 naval postgradua...
  • 2 篇 moscow mv lomono...
  • 1 篇 macronix int co ...
  • 1 篇 washington univ ...
  • 1 篇 saarland univ sa...
  • 1 篇 acad sinica inst...
  • 1 篇 univ grenoble al...
  • 1 篇 uppsala univ dep...
  • 1 篇 natl taiwan univ...
  • 1 篇 hewlett packard ...
  • 1 篇 georgia inst tec...
  • 1 篇 univ udine udine
  • 1 篇 dep. comp. sci. ...
  • 1 篇 department of en...
  • 1 篇 center for secur...
  • 1 篇 hebei univ cyber...
  • 1 篇 department of ee...
  • 1 篇 texas state univ...
  • 1 篇 harvard univ sch...

作者

  • 3 篇 wang meng
  • 2 篇 tian cong
  • 2 篇 grigoriadou mari...
  • 2 篇 kyriakou christi...
  • 2 篇 duan zhenhua
  • 2 篇 gogoulou agorits...
  • 1 篇 kassab mohamad
  • 1 篇 fellman rd
  • 1 篇 david bainbridge
  • 1 篇 liu shaoshan
  • 1 篇 mueller peter
  • 1 篇 brzozowski marci...
  • 1 篇 infante alejandr...
  • 1 篇 izu cruz
  • 1 篇 ronald c. arkin
  • 1 篇 black m
  • 1 篇 chang hung-sheng
  • 1 篇 kevin leach
  • 1 篇 langendoerfer pe...
  • 1 篇 walkinshaw neil

语言

  • 100 篇 英文
  • 4 篇 其他
检索条件"主题词=Program execution"
104 条 记 录,以下是41-50 订阅
排序:
Micro execution  2014
Micro Execution
收藏 引用
36th International Conference on Software Engineering (ICSE)
作者: Godefroid, Patrice Microsoft Res One Microsoft Way Redmond WA 98052 USA
Micro execution is the ability to execute any code fragment without a user-provided test driver or input data. The user simply identifies a function or code location in an exe or dll. A runtime Virtual Machine (VM) cu... 详细信息
来源: 评论
On Energy Efficiency of Reconfigurable Systems with Run-Time Partial Reconfiguration
On Energy Efficiency of Reconfigurable Systems with Run-Time...
收藏 引用
21st IEEE International Conference on Application-Specific Systems, Architectures and Processors
作者: Liu, Shaoshan Pittman, Richard Neil Forin, Alessandro Gaudiot, Jean-Luc Univ Calif Irvine EECS Irvine CA 92717 USA Microsoft Res Redmond WA USA
In this paper we study whether partial reconfiguration can be used to reduce FPGA energy consumption. In an ideal scenario, we will have a hardware accelerator to assist with certain parts of program execution. When t... 详细信息
来源: 评论
Dynamic Detection and Mitigation of DMA Races in MPSoCs  18
Dynamic Detection and Mitigation of DMA Races in MPSoCs
收藏 引用
18th Euromicro Conference on Digital System Design (DSD)
作者: Saidi, Selma Falcone, Ylics Tech Univ Carolo Wilhelmina Braunschweig Inst Comp & Network Engn Braunschweig Germany Univ Grenoble Alpes Inria LIG F-38000 Grenoble France
Explicitly managed memories have emerged as a good alternative for multicore processors design in order to reduce energy and performance costs. Memory transfers then rely on Direct Memory Access (DMA) engines which pr... 详细信息
来源: 评论
A PCM Translation Layer for Integrated Memory and Storage Management  14
A PCM Translation Layer for Integrated Memory and Storage Ma...
收藏 引用
International Conference on Hardware / Software Codesign and System Synthesis (CODES+ISSS)
作者: Chang, Bing-Jing Chang, Yuan-Hao Chang, Hung-Sheng Kuo, Tei-Wei Li, Hsiang-Pang Macronix Int Co Ltd Emerging Syst Lab Hsinchu Taiwan Natl Taiwan Univ Dept Comp Sci & Informat Engn Taipei Taiwan Acad Sinica Inst Informat Sci Taipei Taiwan Acad Sinica Res Ctr Informat Technol Innovat Taipei Taiwan
Phase change memory (PCM) is known for its potentials as main memory and as storage. In contrast to the past work, this work presents a PCM translation layer that considers how the main memory is used by the operating... 详细信息
来源: 评论
HeapTherapy: An Efficient End-to-end Solution against Heap Buffer Overflows  45
HeapTherapy: An Efficient End-to-end Solution against Heap B...
收藏 引用
45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
作者: Zeng, Qiang Zhao, Mingyi Liu, Peng Penn State Univ University Pk PA 16802 USA
For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities. Although many techniques have been proposed to address the problem, they mostly introduce a very high overhead w... 详细信息
来源: 评论
Data Remanence and Digital Forensic Investigation for CUDA Graphics Processing Units  14
Data Remanence and Digital Forensic Investigation for CUDA G...
收藏 引用
IFIP/IEEE International Symposium on Integrated Network Management (IM)
作者: Bellekens, Xavier Paul, Greig Irvine, James M. Tachtatzis, Christos Atkinson, Robert C. Kirkham, Tony Renfrew, Craig Univ Strathclyde Glasgow G1 1XQ Lanark Scotland Keysight Technol Santa Rosa CA USA
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (GPUs). With recent advances in the performance and viability of using GPUs for various highly-parallelised data proce... 详细信息
来源: 评论
Applying perceptrons to computer architecture
Applying perceptrons to computer architecture
收藏 引用
International Conference on Intelligent Sensing and Information Processing
作者: Black, M Franklin, M Univ Maryland Dept Elect & Comp Engn College Pk MD 20742 USA
Speculation plays,in ever-increasing role it optimising the execution of programs in computer architecture. Speculative decision-makers are typically required to have high speed and small size, thus limiting their com... 详细信息
来源: 评论
gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error Analysis  49
gem5-Approxilyzer: An Open-Source Tool for Application-Level...
收藏 引用
49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
作者: Venkatagiri, Radha Ahmed, Khalique Mahmoud, Abdulrahman Misailovic, Sasa Marinov, Darko Fletcher, Christopher W. Adve, Santa, V Univ Illinois Champaign IL 61820 USA
Modern systems are increasingly susceptible to soft errors in the field and traditional redundancy-based mitigation techniques are too expensive to protect against all errors. Recent techniques, such as approximate co... 详细信息
来源: 评论
HW/SW Co-Detection of Transient and Permanent Faults with Fast Recovery in Statically Scheduled Data Paths
HW/SW Co-Detection of Transient and Permanent Faults with Fa...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition (DATE)
作者: Schoelzel, Mario Brandenburg Tech Univ Cottbus Dept Comp Sci Cottbus Germany
This paper describes a hardware-/software-based technique to make the data path of a statically scheduled super scalar processor fault tolerant. The results of concurrently executed operations can be compared with lit... 详细信息
来源: 评论
A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events  47
A Practical Methodology for Measuring the Side-Channel Signa...
收藏 引用
47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Callan, Robert Zajic, Alenka Prvulovic, Milos Georgia Inst Technol Atlanta GA 30332 USA
This paper presents a new metric, which we call Signal Available to Attacker (SAVAT), that measures the side channel signal created by a specific single-instruction difference in program execution, i.e. the amount of ... 详细信息
来源: 评论