搜索结果: 1-15 共查到“知识库 计算机存储技术”相关记录227条 . 查询时间(2.234 秒)
中国科学院上海微系统与信息技术研究所研制出具有极限操作速度的相变存储器(图)
极限操作速度 相变存储器 电脑系统
font style='font-size:12px;'>
2023/2/17
哈尔滨工程大学计算机科学与技术学院科研成果系列发布(第五十期)(图)
哈尔滨工程大学计算机科学与技术学院 科研成果 第五十期 存储器 图形处理器
font style='font-size:12px;'>
2022/8/20
HISTORIC BIM: A NEW REPOSITORY FOR STRUCTURAL HEALTH MONITORING
Archive BIM Bridge HBIM Monitoring Repository
font style='font-size:12px;'>
2017/6/20
Recent developments in Building Information Modelling (BIM) technologies are facilitating the management of historic complex structures using new applications. This paper proposes a generative method ...
随着遥感、定位等技术的不断发展,时空数据大量的产生需要科学化的管理,从而发挥其价值。研究现状中,大量的工作关注于如何利用HBase有效存储和快速查询结构化的时空数据,然而实际中,有些时空数据存在于半结构文档中,如描述遥感产品的元数据,对于这类数据,往往进行如XPath的半结构化+时空查询,这个问题在前序工作中较少讨论。本文针对在HBase中如何进行有效的半结构化时空数据存储和查询问题展开研究,首先...
Memory Management with Explicit Regions
Memory Management Explicit Regions
font style='font-size:12px;'>
2016/5/24
Much research has been devoted to studies of and algorithms for memory management based on garbage collection or explicit allocation and deallocation. An alternative approach, region-based memory mana...
Context- and Path-Sensitive Memory Leak Detection
Program analysis error detection memory management memory leaks boolean satisfiability
font style='font-size:12px;'>
2016/5/24
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying escape analysis: any a...
Compilation for Explicitly Managed Memory Hierarchies
Software-managed memory hierarchy bulk operations
font style='font-size:12px;'>
2016/5/24
We present a compiler for machines with an explicitly managed memory hierarchy and suggest that a primary role of any compiler for such architectures is to manipulate and schedule a hierarchy of bulk ...
A Portable Runtime Interface For Multi-Level Memory Hierarchies
Memory Hierarchies Parallelism Runtime Sequoia
font style='font-size:12px;'>
2016/5/24
We present a platform independent runtime interface for moving data and computation through parallel machines with multi-level memory hierarchies. We show that this interface can be used as a compiler...
Symbolic Heap Abstraction with Demand-Driven Axiomatization of Memory Invariants
Heap Analysis Relational Static Analysis Array Analysis Memory Invariants
font style='font-size:12px;'>
2016/5/24
Many relational static analysis techniques for precise reasoning about heap contents perform an explicit case analysis of all possible heaps that can arise. We argue that such precise relational reaso...
M3: High-Performance Memory Management from Off-the-Shelf Components
Memory Management Garbage Collection Tracing Mark-Sweep Reference Counting
font style='font-size:12px;'>
2016/5/24
Real-world garbage collectors in managed languages are complex.We investigate whether this complexity is really necessary and show that by having a different (but wider) interface between the collecto...
Automatic and Transparent I/O Optimization With Storage Integrated Application Runtime Support
Automatic Transparent I/O Optimization Storage Integrated Application Runtime Support
font style='font-size:12px;'>
2016/5/24
Traditionally storage has not been part of a programming model’s semantics and is added only as an I/O library interface.
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Physical Security Small Embedded Devices COMP128-1 Implementations SIM Cards
font style='font-size:12px;'>
2016/1/23
Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget.How...
Memory-built-in quantum cloning in a hybrid solid-state spin register
Memory-built-in quantum cloning hybrid solid-state spin register
font style='font-size:12px;'>
2016/1/22
As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provi...