Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Address space

Known as: Address (computing), Adress space, Address 
In computing, an address space defines a range of discrete addresses, each of which may correspond to a network host, peripheral device, disk sector… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Software developers commonly exploit multicore processors by building multithreaded software in which all threads of an… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 5
Highly Cited
2006
Highly Cited
2006
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
Active worms spread in an automated fashion and can flood the Internet in a very short time. Modeling the spread of active worms… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2001
Highly Cited
2001
The Cooperative File System (CFS) is a new peer-to-peer read-only storage system that provides provable guarantees for the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2000
Highly Cited
2000
IP multicast offers the scalable point-to-multipoint delivery necessary for using group communication applications on the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
1997
Highly Cited
1997
The ideal distributed file system would provide all its users with coherent, shared access to the same set of files, yet would be… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Highly Cited
1997
Highly Cited
1997
Squeak is an open, highly-portable Smalltalk implementation whose virtual machine is written entirely in Smalltalk, making it… Expand
  • table 4
  • table 6
  • table 5
Highly Cited
1990
Highly Cited
1990
We are developing Munin, a system that allows programs written for shared memory multiprocessors to be executed efficiently on… Expand
  • figure 1
Highly Cited
1982
Highly Cited
1982
The implementation of protocol P on a sending host S decides,through protocol P's routing mechanism, that it wants to transmitto… Expand
Highly Cited
1980
Highly Cited
1980
Linear hashing is a hashing in which the address space may grow or shrink dynamically. A file or a table may then support any… Expand
  • figure 1
  • table 1
  • table 2