Academic literature on the topic 'Memory accesses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Memory accesses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Memory accesses"
Heirman, Wim, Stijn Eyerman, Kristof Du Bois, and Ibrahim Hur. "Automatic Sublining for Efficient Sparse Memory Accesses." ACM Transactions on Architecture and Code Optimization 18, no. 3 (2021): 1–23. http://dx.doi.org/10.1145/3452141.
Full textAchermann, Reto, Lukas Humbel, David Cock, and Timothy Roscoe. "Formalizing Memory Accesses and Interrupts." Electronic Proceedings in Theoretical Computer Science 244 (March 15, 2017): 66–116. http://dx.doi.org/10.4204/eptcs.244.4.
Full textKim, Bo-Sung, and Jun-Dong Cho. "Maximizing Memory Data Reuse for Lower Power Motion Estimation." VLSI Design 14, no. 3 (2002): 299–305. http://dx.doi.org/10.1080/10655140290011096.
Full textCHOI, YOONSEO, and TAEWHAN KIM. "MEMORY ACCESS DRIVEN STORAGE ASSIGNMENT FOR VARIABLES IN EMBEDDED SYSTEM DESIGN." Journal of Circuits, Systems and Computers 15, no. 02 (2006): 145–68. http://dx.doi.org/10.1142/s0218126606003003.
Full textTao, Jie, Wolfgang Karl, and Martin Schulz. "Memory Access Behavior Analysis of NUMA-Based Shared Memory Programs." Scientific Programming 10, no. 1 (2002): 45–53. http://dx.doi.org/10.1155/2002/790749.
Full textCavus, Mustafa, Resit Sendag, and Joshua J. Yi. "Informed Prefetching for Indirect Memory Accesses." ACM Transactions on Architecture and Code Optimization 17, no. 1 (2020): 1–29. http://dx.doi.org/10.1145/3374216.
Full textLin, Yuan, and David Padua. "Compiler analysis of irregular memory accesses." ACM SIGPLAN Notices 35, no. 5 (2000): 157–68. http://dx.doi.org/10.1145/358438.349322.
Full textAinsworth, Sam, and Timothy M. Jones. "Software Prefetching for Indirect Memory Accesses." ACM Transactions on Computer Systems 36, no. 3 (2019): 1–34. http://dx.doi.org/10.1145/3319393.
Full textEsakkimuthu, G., H. S. Kim, M. Kandemir, N. Vijaykrishnan, and M. J. Irwin. "Investigating Memory System Energy Behavior Using Software and Hardware Optimizations." VLSI Design 12, no. 2 (2001): 151–65. http://dx.doi.org/10.1155/2001/70310.
Full textChen, Wei-Ming, Tei-Wei Kuo, and Pi-Cheng Hsiu. "Heterogeneity-aware Multicore Synchronization for Intermittent Systems." ACM Transactions on Embedded Computing Systems 20, no. 5s (2021): 1–22. http://dx.doi.org/10.1145/3476992.
Full textDissertations / Theses on the topic "Memory accesses"
Österberg, Erik. "Profiling memory accesses on the ODROID-XU4." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-332800.
Full textAng, Su-Shin. "Handling data dependent memory accesses in custom hardware applications." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501122.
Full textLim, Nien Yi. "Separating instruction fetches from memory accesses ILAR (Instruction Line Associative Registers) /." Lexington, Ky. : [University of Kentucky Libraries], 2009. http://hdl.handle.net/10225/1121.
Full textJiang, Peng. "Enabling Efficient Parallelism for Applications with Dependences and Irregular Memory Accesses." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1563461701172592.
Full textCramer, Tim Verfasser], Matthias [Akademischer Betreuer] Müller, and Joost-Pieter [Akademischer Betreuer] [Katoen. "Analyzing memory accesses for performance and correctness of parallel programs / Tim Cramer ; Matthias Müller, Joost-Pieter Katoen." Aachen : Universitätsbibliothek der RWTH Aachen, 2017. http://d-nb.info/1161412042/34.
Full textCramer, Tim [Verfasser], Matthias Akademischer Betreuer] Müller, and Joost-Pieter [Akademischer Betreuer] [Katoen. "Analyzing memory accesses for performance and correctness of parallel programs / Tim Cramer ; Matthias Müller, Joost-Pieter Katoen." Aachen : Universitätsbibliothek der RWTH Aachen, 2017. http://d-nb.info/1161412042/34.
Full textSegura, Salvador Albert. "High-performance and energy-efficient irregular graph processing on GPU architectures." Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/671449.
Full textCollington, James Robert. "Optically accessed electronic memory." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627357.
Full textAli, Nawab. "Improving paging performance of memor-intensive applications with memory access pattern guided page replacement." Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1092701375.
Full textBendifallah, Zakaria. "Généralisation de l’analyse de performance décrémentale vers l’analyse différentielle." Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS038V/document.
Full textBooks on the topic "Memory accesses"
Semiconductor, National. Random access memory databook. National Semiconductor, 1987.
Find full textDenning, Peter J. Is random access memory random? Research Institute for Advanced Computer Science, NASA Ames Research Center, 1986.
Find full textSangyōshō, Japan Keizai. DRAM no juyō to kyōkyū no kankei oyobi sorera ga kokunai kakaku ni ataeta eikyō tō ni tsuite no teiryōteki bunseki to genʼin tankyū: Hōkokusho. Nomura Sōgō Kenkyūjo, 2005.
Find full text1978-, Kishi Hirofumi, ed. Teikō henka memori no chiteki zairyō sekkei: Intelligent/directed materials design for resistance random access memory. Ōsaka Daigaku Shuppankai, 2012.
Find full textNonvolatile memories: Materials, device and applications. American Scientific Publishers, 2012.
Find full textKanad, Chakraborty, ed. Testing and testable design of high-density random-access memories. Kluwer Academic, 1996.
Find full textInc, Toshiba America, and Toshiba America. Toshiba MOS memory products data book. Toshiba America, 1987.
Find full textBook chapters on the topic "Memory accesses"
Balakrishnan, Gogul, and Thomas Reps. "Analyzing Memory Accesses in x86 Executables." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24723-4_2.
Full textVenable, Michael, Mohamed R. Chouchane, Md Enamul Karim, and Arun Lakhotia. "Analyzing Memory Accesses in Obfuscated x86 Executables." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11506881_1.
Full textUnsal, Osman S., Zhenlin Wang, Israel Koren, C. Mani Krishna, and Csaba Andras Moritz. "An Analysis of Scalar Memory Accesses in Embedded and Multimedia Systems." In High Performance Memory Systems. Springer New York, 2004. http://dx.doi.org/10.1007/978-1-4419-8987-1_13.
Full textGesellensetter, Lars, and Sabine Glesner. "Interprocedural Speculative Optimization of Memory Accesses to Global Variables." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-85451-7_38.
Full textWu, Lin, Qingfeng Zhuge, Edwin H. M. Sha, and Zhilong Sun. "Efficient Scheduling with Intensive In-Memory File Accesses Considering Bandwidth Constraint on Memory Bus." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27122-4_39.
Full textChi, Chi-Hung, and Jun-Li Yuan. "Sequential Unification and Aggressive Lookahead Mechanisms for Data Memory Accesses." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48387-x_3.
Full textPaulino, Nuno, João Canas Ferreira, and João M. P. Cardoso. "Architecture for Transparent Binary Acceleration of Loops with Memory Accesses." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36812-7_12.
Full textChen, Chien-Ting, Yoshi Shih-Chieh Huang, Yuan-Ying Chang, et al. "Designing Coalescing Network-on-Chip for Efficient Memory Accesses of GPGPUs." In Advanced Information Systems Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44917-2_15.
Full textMazurek, Przemysław. "Optimization of Memory Accesses for CUDA Architecture and Image Warping Algorithms." In Advances in Intelligent Systems and Computing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-32384-3_16.
Full textAbdulla, Parosh Aziz, Mohamed Faouzi Atig, Adwait Godbole, S. Krishna, and Viktor Vafeiadis. "The Decidability of Verification under PS 2.0." In Programming Languages and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72019-3_1.
Full textConference papers on the topic "Memory accesses"
Srivastava, Ajitesh, Angelos Lazaris, Benjamin Brooks, Rajgopal Kannan, and Viktor K. Prasanna. "Predicting memory accesses." In MEMSYS '19: The International Symposium on Memory Systems. ACM, 2019. http://dx.doi.org/10.1145/3357526.3357549.
Full textAkin, Berkin, Chiachen Chou, Jongsoo Park, Christopher J. Hughes, and Rajat Agarwal. "Dynamic fine-grained sparse memory accesses." In MEMSYS '18: The International Symposium on Memory Systems. ACM, 2018. http://dx.doi.org/10.1145/3240302.3240416.
Full textKo, Yohan, Hyunjun Kim, and Hwansoo Han. "Escalating Memory Accesses to Shared Memory by Profiling Reuse." In IMCOM '16: The 10th International Conference on Ubiquitous Information Management and Communication. ACM, 2016. http://dx.doi.org/10.1145/2857546.2857579.
Full textAinsworth, Sam, and Timothy M. Jones. "Software prefetching for indirect memory accesses." In 2017 IEEE/ACM International Symposium on Code Generation and Optimization (CGO). IEEE, 2017. http://dx.doi.org/10.1109/cgo.2017.7863749.
Full textLin, Yuan, and David Padua. "Compiler analysis of irregular memory accesses." In the ACM SIGPLAN 2000 conference. ACM Press, 2000. http://dx.doi.org/10.1145/349299.349322.
Full textHalstead, Robert J., Jason Villarreal, and Walid Najjar. "Exploring irregular memory accesses on FPGAs." In the first workshop. ACM Press, 2011. http://dx.doi.org/10.1145/2089142.2089151.
Full textGoel, S., M. Shaaban, T. Darwish, H. Mahmoud, and M. Bayoumi. "Memory accesses reduction for MIME algorithm." In 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698). IEEE, 2003. http://dx.doi.org/10.1109/icme.2003.1221739.
Full textNoll, Stefan, Jens Teubner, Norman May, and Alexander Böhm. "Analyzing memory accesses with modern processors." In SIGMOD/PODS '20: International Conference on Management of Data. ACM, 2020. http://dx.doi.org/10.1145/3399666.3399896.
Full textGuo, Xiaomei, and Haiyun Han. "The Research of a Memory Accesses Behavior on Non-Uniform Memory Access Architecture." In 2019 10th International Conference on Information Technology in Medicine and Education (ITME). IEEE, 2019. http://dx.doi.org/10.1109/itme.2019.00174.
Full textJorda, Jacques, and Abdelaziz M'zoughi. "Isomorphic Recursive Splitting: Conflict-Free Memory Accesses for Structured Memory." In 2012 41st International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2012. http://dx.doi.org/10.1109/icppw.2012.78.
Full textReports on the topic "Memory accesses"
Balakrishnan, Gogul, and Thomas Reps. Analyzing Memory Accesses in x86 Executables. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada449077.
Full textCypher, Robert. Valiant's Maximum Algorithm with Sequential Memory Accesses. Defense Technical Information Center, 1988. http://dx.doi.org/10.21236/ada203713.
Full textDaily, Jeffrey, and Dan Berghofer. Efficient Memory Access with NumPy Global Arrays using Local Memory Access. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1136617.
Full textPsaltis, Demetri. Holographic Random Access Memory. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada329446.
Full textCerjan, C., and B. P. Law. Magnetic Random Access Memory (MRAM) Device Development. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/15006522.
Full textRecio, R., B. Metzler, P. Culley, J. Hilland, and D. Garcia. A Remote Direct Memory Access Protocol Specification. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc5040.
Full textShah, H., F. Marti, W. Noureddine, A. Eiriksson, and R. Sharp. Remote Direct Memory Access (RDMA) Protocol Extensions. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7306.
Full textDonohoe, Gregory W. Magnetic Random Access Memory for Embedded Computing. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada474855.
Full textKelsey, John, and Bruce Schneier. Authenticating Secure Tokens Using Slow Memory Access. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada385266.
Full textSharp, R., and S. Wise. Enhanced Remote Direct Memory Access (RDMA) Connection Establishment. Edited by A. Kanevsky and C. Bestler. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6581.
Full text