Academic literature on the topic 'Cycle stealing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cycle stealing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cycle stealing"
Osogami, Takayuki, Mor Harchol-Balter, and Alan Scheller-Wolf. "Analysis of cycle stealing with switching cost." ACM SIGMETRICS Performance Evaluation Review 31, no. 1 (2003): 184–95. http://dx.doi.org/10.1145/885651.781050.
Full textJiang, Bo, Philippe Nain, and Don Towsley. "Covert Cycle Stealing in a Single FIFO Server." ACM Transactions on Modeling and Performance Evaluation of Computing Systems 6, no. 2 (2021): 1–33. http://dx.doi.org/10.1145/3462774.
Full textOsogami, Takayuki, Mor Harchol-Balter, and Alan Scheller-Wolf. "Analysis of cycle stealing with switching times and thresholds." Performance Evaluation 61, no. 4 (2005): 347–69. http://dx.doi.org/10.1016/j.peva.2004.09.003.
Full textHalang, Wolfgang A. "On methods for direct memory access without cycle stealing." Microprocessing and Microprogramming 17, no. 5 (1986): 277–83. http://dx.doi.org/10.1016/0165-6074(86)90003-7.
Full textKotani, Y., F. Ino, and K. Hagihara. "A Resource Selection System for Cycle Stealing in GPU Grids." Journal of Grid Computing 6, no. 4 (2008): 399–416. http://dx.doi.org/10.1007/s10723-008-9099-7.
Full textForshaw, Matthew, A. Stephen McGough, and Nigel Thomas. "Energy-efficient Checkpointing in High-throughput Cycle-stealing Distributed Systems." Electronic Notes in Theoretical Computer Science 310 (January 2015): 65–90. http://dx.doi.org/10.1016/j.entcs.2014.12.013.
Full textBradley, Jeremy T., Matthew Forshaw, Anton Stefanek, and Nigel Thomas. "Time-inhomogeneous Population Models of a Cycle-Stealing Distributed System." Electronic Notes in Theoretical Computer Science 318 (November 2015): 5–17. http://dx.doi.org/10.1016/j.entcs.2015.10.016.
Full textGupta, Ankur, and Lalit K. Awasthi. "A Containment-Based Security Model for Cycle-Stealing P2P Applications." Information Security Journal: A Global Perspective 19, no. 4 (2010): 191–203. http://dx.doi.org/10.1080/19393551003762207.
Full textBhatt, S. N., F. R. K. Chung, F. T. Leighton, and A. L. Rosenberg. "On optimal strategies for cycle-stealing in networks of workstations." IEEE Transactions on Computers 46, no. 5 (1997): 545–57. http://dx.doi.org/10.1109/12.589220.
Full textRosenberg, Arnold L. "Guidelines for Data-Parallel Cycle-Stealing in Networks of Workstations." Journal of Parallel and Distributed Computing 59, no. 1 (1999): 31–53. http://dx.doi.org/10.1006/jpdc.1999.1564.
Full textDissertations / Theses on the topic "Cycle stealing"
Robertson, Calum Stewart. "Parallel data mining on cycle stealing networks." Thesis, Queensland University of Technology, 2004. https://eprints.qut.edu.au/15970/1/Calum_Robertson_Thesis.pdf.
Full textRobertson, Calum Stewart. "Parallel Data Mining On Cycle Stealing Networks." Queensland University of Technology, 2004. http://eprints.qut.edu.au/15970/.
Full textMason, Richard S. "A framework for fully decentralised cycle stealing." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/26039/1/Richard_Mason_Thesis.pdf.
Full textMason, Richard S. "A framework for fully decentralised cycle stealing." Queensland University of Technology, 2007. http://eprints.qut.edu.au/26039/.
Full textSumitomo, Jiro. "A programming model and performance model for cycle stealing." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16320/1/Jiro_Sumitomo.pdf.
Full textSumitomo, Jiro. "A programming model and performance model for cycle stealing." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16320/.
Full textTai, Chin-Chung, and 戴誌中. "A Cycle-Stealing Technique for Pipelined Instruction Decompression System for Embedded Microprocessors." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/82601726338967749751.
Full textChu, Ching-Hua, and 朱慶華. "A New Cycle-Stealing with Interrupt Handling Technique for Pipelined Instruction Decompression System in Embedded Microprocessors." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/19290974358050293400.
Full textBooks on the topic "Cycle stealing"
Oxley, Mat. Stealing speed: The biggest spy game in motorsport history. Haynes North America Inc, 2010.
Find full textOxley, Mat. Stealing speed: The biggest spy scandal in motorsport history. Haynes, 2009.
Find full textOlsen, Charlotte. Stop Anxiety: Special Edition - Two Books - End the Cycle of Anxiety and Panic Attacks from Stealing Your Freedom and Opportunities. Workable Plans Anyone Can Implement Quickly to See Results. Independently Published, 2018.
Find full textBook chapters on the topic "Cycle stealing"
Kelly, P. H. J., S. Pelagatti, and M. Rossiter. "Instant-Access Cycle-Stealing for Parallel Applications Requiring Interactive Response." In Euro-Par 2002 Parallel Processing. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45706-2_122.
Full textKotani, Yuki, Fumihiko Ino, and Kenichi Hagihara. "A Resource Selection Method for Cycle Stealing in the GPU Grid." In Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11942634_79.
Full textAntony, Robert J. "The Laboring Poor and Banditry." In Unruly People. Hong Kong University Press, 2016. http://dx.doi.org/10.5790/hongkong/9789888208951.003.0007.
Full textConference papers on the topic "Cycle stealing"
Harchol-Balter, Mor, Cuihong Li, Takayuki Osogami, Alan Scheller-Wolf, and Mark S. Squillante. "Cycle stealing under immediate dispatch task assignment." In the fifteenth annual ACM symposium. ACM Press, 2003. http://dx.doi.org/10.1145/777412.777462.
Full textOsogami, Takayuki, Mor Harchol-Balter, and Alan Scheller-Wolf. "Analysis of cycle stealing with switching cost." In the 2003 ACM SIGMETRICS international conference. ACM Press, 2003. http://dx.doi.org/10.1145/781027.781050.
Full textKyung Dong Ryu and J. K. Hollingsworth. "Fine-Grain Cycle Stealing for Networks of Workstations." In SC98 - High Performance Networking and Computing Conference. IEEE, 1998. http://dx.doi.org/10.1109/sc.1998.10011.
Full textRyu, Kyung Dong, Jeffrey K. Hollingsworth, and Peter J. Keleher. "Mechanisms and policies for supporting fine-grained cycle stealing." In the 13th international conference. ACM Press, 1999. http://dx.doi.org/10.1145/305138.305170.
Full textLin, Jwo-An, Yung-Chou Tsai, Tay-Jyi Lin, and Yarsun Hsu. "Cycle Stealing and Channel Management for On-Chip Networks." In 2008 10th IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2008. http://dx.doi.org/10.1109/hpcc.2008.60.
Full textWidorek, Rafal, and Cezary Worek. "Sequential cycle stealing — A novel control method dedicated for resonant converters." In 2015 17th European Conference on Power Electronics and Applications (EPE'15 ECCE-Europe). IEEE, 2015. http://dx.doi.org/10.1109/epe.2015.7309358.
Full text"On Energy-efficient Checkpointing in High-throughput Cycle-stealing Distributed Systems." In 3rd International Conference on Smart Grids and Green IT Systems. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0004958302620267.
Full textRyu, Kyung D., Jeffrey K. Hollingsworth, and Peter J. Keleher. "Efficient network and I/O throttling for fine-grain cycle stealing." In the 2001 ACM/IEEE conference. ACM Press, 2001. http://dx.doi.org/10.1145/582034.582037.
Full textJeang, Yuan-Long, Tzuu-shaang Wey, Hung-Yu Wang, Chih-Chung Tai, and Ching-Hua Chu. "A Cycle-Stealing Technique for Pipelined Instruction Decompression System for Embedded Microprocessors." In Second International Conference on Innovative Computing, Informatio and Control (ICICIC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icicic.2007.12.
Full textJeang, Yuan-Long, Tzuu-Shaang Wey, Hung-Yu Wang, and Ching-Hua Chu. "A New Cycle-Stealing Technique for Pipelined Instruction Decompression System for Microprocessors." In 2008 3rd International Conference on Innovative Computing Information and Control. IEEE, 2008. http://dx.doi.org/10.1109/icicic.2008.57.
Full text