Search

Your search keyword '"memory utilization"' showing total 65 results

Search Constraints

Start Over You searched for: Descriptor "memory utilization" Remove constraint Descriptor: "memory utilization"
65 results on '"memory utilization"'

Search Results

1. A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION

2. Optimizing Database Systems for Parallel Processing in Multi-core Environments

3. Event Tracking and Analysis in Social Text Stream

5. Multi-protocol switching circuit for software defined interconnection system

7. Multi-region SRAM-Based TCAM for Longest Prefix

8. Impact and Analysis of Denial-of-Service Attack on an Autonomous Vehicle Test Bed Setup

9. Genetic algorithm with self adaptive immigrants for effective virtual machine placement in cloud environment.

10. Advancing Robot Perception in Non-Spiral Environments through Camera-based Image Processing.

11. Load balancing with Job Migration Algorithm for improving performance on grid computing: Experimental Results

12. Improving Utilization and Life-Span in Parallel Aware MLC-Based SSD Using Virtual Blocks

13. Efficient hash function–based duplication detection algorithm for data Deduplication deduction and reduction.

14. MemFlow: Memory-Driven Data Scheduling With Datapath Co-Design in Accelerators for Large-Scale Inference Applications.

15. MR-MOSLO: VM Consolidation Using Multiple Regression Multi-Objective Seven-Spot Ladybird Optimization for Host Overload Detection.

16. Estimating thread densities in X-rays of old canvases with PyTorch

18. First International Competition on Software for Runtime Verification

20. A High-Level Framework for Distributed Processing of Large-Scale Graphs

27. Storage Utilization in a Memory Hierarchy When Storage Assignment Is Performed by a Hashing Algorithm.

28. Loader Standardization for Overlay Programs.

29. In-depth analysis of dynamic degree load balancing technique in public cloud for heterogeneous cloudlets

30. Using Control Theory to Guide Load Shedding in Medical Data Stream Management System

35. ESAA: Efficient Sequence Alignment Algorithm for Dynamic Malware Analysis in Windows Executable Using API Call Sequence.

36. Load balancing with Job Migration Algorithm for improving performance on grid computing: Experimental Results

38. A rule based probabilistic technique for malware code detection.

39. Design and Implementation of Testing Tool for Code Smell Rectification Using C-Mean Algorithm.

40. FAB: Toward Flow-aware Buffer Sharing on Programmable Switches

41. The Cost of Confidentiality in Cloud Storage

42. Adaptive Parallelism for Coupled, Multithreaded Message-Passing Programs

43. Methods for the Measurement of Memory Utilization and the Improvement of Program Locality.

44. Finding Association Rules Based on Maximal Frequent Itemsets over Data Streams Adaptively.

45. On the memory attribution problem: A solution and case study using MPI.

46. A hybrid cloud controller for vertical memory elasticity : a control-theoretic approach

47. Coordinating CPU and Memory Elasticity Controllers to Meet Service Response Time Constraints

48. Adaptive Parallelism for Coupled, Multithreaded Message-Passing Programs

49. Mixed heuristic and mathematical programming using reference points for dynamic data types optimization in multimedia embedded systems

50. Performance of an Embedded Platform Aggregating and Executing Core Vehicular Interation for C4ISR/EW Interoperability (VICTORY) Services

Catalog

Books, media, physical & digital resources